≡ Menu

May Jollies

Hidden iTunes power search still there

Not all software upgrades improve features. The iTunes store used to have a decent power search feature that would let you hone your search better and it has disappeared. Luckily, it is still available but you have to use a special link to the iTunes store to enable it. And, it has to be redone each time, but at least it is there for those special hard search times.
< http://www.mcelhearn.com/itunes-tip-use-the-hidden-itunes-store-power-search/>

Expensive Facebook mistake

You know putting private in formation on Facebook could come back and haunt you but you may want to think of the teenager who posted about her father’s workplace court settlement that was supposed to be kept secret by all parties involved. Because she posted about his “win” and getting money, the settlement was voided and he lost it all.

Is there finally an internet based deadman switch you can use when you are traveling in dangerous areas? Kitestring.io is a web service where you can create a check-in schedule for a simple text message to be sent to you and if you don’t reply by the time you have preset, your designated contacts will be notified that something might be wrong with you. It is free, but SMS or text charges may apply. Check their site, kitestring.io for their FAQ which might cover other questions you have.

Doing the two-step dance

As the whole login and password process gets more and more compromised, two-factor authentication is being touted as a fix. Two factor authentication relies on having another method to further authenticate you, usually using some one-time code somehow sent to you or generated by a device you have, to provide a dual method to prove you are the correct account user. If you have a google account, you can turn on their two factor authentication and learn how they will text you a one-time code, a second and ever changing password if you will, so that they can double-check your autheticity. The logic of two-factor authentication is that someone impersonating you may know your google account and password but won’t also have control of your phone.

Password tricks may be pointless

I am sure you have tricks for generating safe passwords, using phrases with certain letters replaced by the number that look like letters, 1 for l, 5 for s, 0 for o and so forth. Password cracking programs excel at “guessing” these kind of passwords. Other tricks might include capitalizing the first letter, ending with one or two numbers, placing your hands one key left or right, using phrases from common books like the Bible, and all of them are patterns that password crackers are catching onto. The only safe pattern is one that someone else does not use as the software for password cracking has gotten exponentially more sofisticated in the past year or so. It is to the point that memorable password, based on patterns or letter subsitutions are not good enough, you need to be using as randomly generated a password as possible, and ideally, a different one for each service that handles sensitive information.

They really are trying

Microsoft really is trying to make Windows 8 better, getting it so that the latest version is changing the way part of the UI, user interface, work depending on whether you have a touch screen or not, and how you use the mouse and keyboard. Most of us use just one or the other so you won’t notice how a touch will do one with with the title bars when you touch launch a “tile” app versus using a mouse for the same action. Microsoft’s state goal is to make certain subtle changes in the interface where they are finding that touchers expect different things to show or not show compared to mousers. Subtle is their wisdom.

Next post:

Previous post: