Time Machine doesn’t just back up to external drives. Enable Time Machine on your MacBook and it will create “local snapshots,” too — potentially taking up over 100 GB of disk space on its internal storage.
At a giant Best Buy repair shop in Brooks, Ky., Geek Squad technicians work on computers owned by people across the country, delving into them to retrieve lost data. Over several years, a handful of those workers have notified the FBI when they see signs of child pornography, earning payments from the agency. Read full article at Washington Post
NOTE - In this case, the alleged files weree in "unallocated space" - they had been deleted. The tech had to intentionlly scan for dleted files and would not have been able to see or recover them without special tools.
The FLIR ONE is a thermal imaging camera attachment for iOS and Android devices. The FLIR model for Android uses a micro USB connector while several newer devices including the Nexus 5X employ the newer USB Type-C connector. Many micro USB to USB Type-C adaptors do not support the 5X being the host and the FLIR being the device (using a USB C to C cable to a Mac, for example, the Mac is the host and the 5X is the device). Using a non-compliant connector the FLIR ONE Android app does not see the camera.
Web searches return warnings about using un-tested micro USB to USB C adaptors or USB Type-C to female micro USB cables for charging. A good discussion by Geoff Hoff can be found here. Using the app Current Monitor by Eric Johnson, the VicTsing USB 3.1 Type-C to Micro USB Convert Connector appears to be safe to use for charging. The charge current started in FAST mode, then when the phone reached 95% charge it switched to TAPER mode and reduced current through 100%. Nonetheless, I plan on using the adaptor only for the FLIR and sticking with the USB C charger that came with the Nexus 5X.
Always update your Apple software from the Updates section of the Apple App Store. Click the Apple icon on the top left of the display, select "About this Mac" and click on Software Update. Never update by way of a link on a webpage or an email.
Update non-Apple software from within the application or from the company's web site. Beware of ectra or bonus software downloads during updates. Oracle's Java updates are notorious for installing unnecessary toolbars. Less scrupulous companies are often the source of unwanted add-ons that can steal data or show unwanted ads.
Make Time Machine backups
Select the option to encrypt backups.
Keep at least two backups each at a different location and at least one disconnected. See my article on The Dangers of Cloud Sync.
Install anti-virus software.
I use Sophos Home, a free AV program for Macs. Sophos.com
For many years, computer viruses and malware were mostly the concern of Windows users. Mac users faced very few threats. This has been atributed to the Mac's sibgle digit market share and, some have argued, a more secure product. One common misconception was that Macs were somehow imune from viruses and malware. While the number of threats may pale in comparrisln to Windows, Macs are indeed suseptible to attack and more and more are appearing. The time has come for Mac users to make secutity a priority.
In the last few weeks, researchers have found the first Mac Ransomware malware in circulation. Ransomware is software that encrypts the files on a computer making them unuseable to the owner. The person controllling the malware then demnads a ransom to unencrypt the files. In most cases, the victim has only 72 hours to pay or the ransom or the malware author threatens to eraswe the key that is needed to restore the files. Regardless of the size of your business, the loss of data can be davastatiung.
Add these new threats to hardware failures and theft and the need for a well thought out and executed computer protection plan is more important then ever.
In late 2014, a small Massachusetts software company got an ominous email: A computer-security researcher said a flaw in one of its programs put millions world-wide at risk of being hacked.
Engineers at the company, Allegro Software Development Corp., analyzed the flaw in the program, which can help users access the controls of home Internet routers. They quickly realized something strange: They had fixed this bug nearly 10 years earlier. But it lived on, even in new devices. Read the article at WSJ
Founded in 1921, Radio Shack and their catalogs were part of my formative years. Allied Electronics / Radio Shack was one of the great catalogs of the 60s. Page through the 1967 catalogue. The company filed for bankruptcy protection on Thursday and stores are liquidating inventory this weekend. If you need some toggle switches, panel lamps in various colors or some 2N107 transistors they are 80% off today - but most people don't need those things. At 50% off normal prices, most other items can still be found online for about the same price and from companies that will take returns. In many ways Radio Shack was ahead of it's time and never managed to change with the times. Photo - Radio Shack Store Duarte CA
Passmark Software provides a large database of CPU benchmark results. Interpreting benchmarks is complex and a single number rarely tells the whole story however it is a good place to start. For computer systems check out GeekBench by Primate Labs.
It's no longer practical to allow comments. Too much spam. Post comments by tweeting to me @danielfishman. If you want to be notified of site updates use the comments form and send me an email address. Thanks!