COVID19 and Stay-at-Home orders make performing this moderately difficult and time consuming procedure make sense.
Continue reading
Tag Archives: technology
How to Free Up Space Used By Time Machine’s Local Backups on Your Mac
Tesla Model 3
Get your own Model 3 (or S or X or Y or Roadster) and use my referral code for lots of cool free stuff. https://ts.la/daniel62369
Digital Privacy at the U.S Border: A New How-To Guide from EFF
An update from the EFF on Digital Privacy at the U.S Border: A New How-To Guide from EFF – download the PDF.
FBI Enlists Geek Squad
FLIR ONE Thermal Imaging Camera & Nexus 5X Phone- Camera Not Recognized
The FLIR ONE is a thermal imaging camera attachment for iOS and Android devices. The FLIR model for Android uses a micro USB connector while several newer devices including the Nexus 5X employ the newer USB Type-C connector. Many micro USB to USB Type-C adaptors do not support the 5X being the host and the FLIR being the device (using a USB C to C cable to a Mac, for example, the Mac is the host and the 5X is the device). Using a non-compliant connector the FLIR ONE Android app does not see the camera.
The VicTsing USB 3.1 Type-C to Micro USB Convert Connector does work with the Nexus 5X and FLIR ONE. The FLIR app connects to the camera and appears to work well.
Web searches return warnings about using un-tested micro USB to USB C adaptors or USB Type-C to female micro USB cables for charging. A good discussion by Geoff Hoff can be found here. Using the app Current Monitor by Eric Johnson, the VicTsing USB 3.1 Type-C to Micro USB Convert Connector appears to be safe to use for charging. The charge current started in FAST mode, then when the phone reached 95% charge it switched to TAPER mode and reduced current through 100%. Nonetheless, I plan on using the adaptor only for the FLIR and sticking with the USB C charger that came with the Nexus 5X.
Thermal image of Max
Protecting Macs from Viruses and Malware
March 11, 2016
For many years, computer viruses and malware were mostly the concern of Windows users. Mac users faced very few threats. This has been atributed to the Mac’s sibgle digit market share and, some have argued, a more secure product. One common misconception was that Macs were somehow imune from viruses and malware. While the number of threats may pale in comparrisln to Windows, Macs are indeed suseptible to attack and more and more are appearing. The time has come for Mac users to make secutity a priority.
In the last few weeks, researchers have found the first Mac Ransomware malware in circulation. Ransomware is software that encrypts the files on a computer making them unuseable to the owner. The person controllling the malware then demnads a ransom to unencrypt the files. In most cases, the victim has only 72 hours to pay or the ransom or the malware author threatens to eraswe the key that is needed to restore the files. Regardless of the size of your business, the loss of data can be davastatiung.
Add these new threats to hardware failures and theft and the need for a well thought out and executed computer protection plan is more important then ever.
You can find my Mac security recomendations here.
Rarely Patched Software Bugs in Home Routers Cripple Security
The Sun Sets on Radio Shack
Founded in 1921, Radio Shack and their catalogs were part of my formative years. Allied Electronics / Radio Shack was one of the great catalogs of the 60s. Page through the 1967 catalogue. The company filed for bankruptcy protection on Thursday and stores are liquidating inventory this weekend. If you need some toggle switches, panel lamps in various colors or some 2N107 transistors they are 80% off today – but most people don't need those things. At 50% off normal prices, most other items can still be found online for about the same price and from companies that will take returns. In many ways Radio Shack was ahead of it's time and never managed to change with the times. Photo – Radio Shack Store Duarte CA
James Bamford’s Edward Snowden Article from Wired
James Bamford’s Wired article on Edward Snowden from August 2014. http://www.wired.com/2014/08/edward-snowden/#ch-1