Applebyte 2006 August - Canterbury Apple Users

Transcription

Applebyte 2006 August - Canterbury Apple Users
About the user group
Applebyte
Magazine of the Apple User Group of Canterbury Inc
Aims
The Apple User Group of Canterbury is a non–profit
organisation for the purpose of exchanging ideas and
expertise about the use of Apple computers, and other
related hardware and software.
Vice–President
Secretary
Treasurer
Committee
The Committee
Murray Wood, MagnumMac
Michael Han
021-268-3015
Euan Kennedy
(03) 980-5712
Jim Pollard
(03) 358-7943
Raewyn Saunders
(03) 337-9305
Peter Fitchett
(03) 960-8189
Steve Adamson
(03) 379-1918
Christine Chapman
(03) 942-2634
Noel Strack
(03) 355-4546
Lorelie Kennedy
(03) 355-5165
president@appleusers.co.nz
vicepres@appleusers.co.nz
secretary@appleusers.co.nz
treasurer@appleusers.co.nz
pfitchett@netaccess.co.nz
essay@xtra.co.nz
xtine@paradise.net.nz
grandpa_nz@xtra.co.nz
lorelie_chch@paradise.net.nz
(evenings)
Snail Mail: PO Box 31–053, Christchurch.
Web: www.appleusers.co.nz
Mailing list:
subscribe-help@appleusers.co.nz (all welcome)
subscribe-augc@appleusers.co.nz (members only)
APPLEBYTE AUGUST 2006
Patron
President
August 2006
Steve Jobs uncovers more surprises at the WWDC
Club Meeting:
Waimairi
School
August 30
7.30 pm
• WWDC News
• Google Earth
• iPhoto
• Spreadsheets
• Raffle
Editor’s Message
by Steve Adamson
This month brought us the annual Worldwide Developers Conference
(WWDC) which showed the next step in Apple’s Operating System and
many new and exciting products to ponder over. It is also 15 years since
the Internet began when Tim Berners-Lee (now Sir) created the first website.
A big thank you to the two members who responded to my request for a
personal profile. I have included them in this issue so you can see layout
ideas. Keep them coming!
–––––––––––––––––––––––––––––––––––––––––––––––––––––––––––
Contents
1
Pres Sez
2
iPhoto Presentation
3
New Microphones’ Debut & the July Raffle
4-5
Member Profile – Euan Kennedy
6
DejaMenu
7
Radio NZ Podcasts
8-12
Applesoup
10
10 New Features in Leopard in Brief
13
Member Profile – Bart Hanson
14-16
Latest Products & News from MagnumMac
15
Wireless Mighty Mouse
17-23
A really rough guide to Nasties on the Internet
24-25
How the Web went World Wide
___________________________________________________________
Copyright:
Articles from Applebyte may only be reproduced with the written
permission of the editor and/or the author.
This Edition:
Was put together on a G5 iMac using OS X 10.4.6 and software Adobe
Indesign CS (version 3)
Appleline
The following members are willing to give some voluntary help to members
who have problems.
Please respect the time they give as many have a working life as well as
catering for family needs.
Difficulty deciding who to contact. For advice where to start contact Sally
Tripp or Peter Fitchett.
Beginners/new users:
Sally Tripp
329-9752
sally.tripp@xtra.co.nz
holliday@ihug.co.nz
Mike Holliday 383-1698
Appleworks:
Ian.Orchard@ihug.co.nz
Ian Orchard*
352-4064
Desktop publishing; Pagemaker/Indesign:
b.carter@paradise.net.nz
Belinda Carter 942-3000
iWork: Pages/iLife:
Peter Fitchett
960-8189
pfitchett@netaccess.co.nz
Internet:
jim.augc@gonzul.net
Jim Cheetham 386-2251
MS Word:
Euan Kennedy 980-5712
gonebush@paradise.net.nz
Networking:
Ian.Orchard@ihug.co.nz
Ian Orchard*
352-4064
Peter Fitchett
960-8189
pfitchett@netaccess.co.nz
Photoshop:
Warren Matthews 379-3071
sallys.preschool@xtra.co.nz
Systems management/problems:
bart@orcon.net.nz
Bart Hanson
980-1199
Systems; OS9:
Euan Kennedy 980-5712
gonebush@paradise.net.nz
Ian.Orchard@ihug.co.nz
Ian Orchard*
352-4064
OSX:
Ian Orchard*
352-4064
Ian.Orchard@ihug.co.nz
If a topic you require assistance with is not listed go to the;
Club’s Website:
www.appleusers.co.nz
* These members are willing to provide help to members but there may be
a charge - you will be told first.
Pres Sez
Meeting Venue
by Michael Han
Meetings are held on the
last Wednesday of each
month (except December)
beginning at 7.30pm, at
Waimairi School in Tillman
Avenue, off Bligh's Road.
WWDC
Drinks and snacks are
available while we all calm
down after the excitement
of the meeting.
Some members carpool to get to meetings. If you don't have a car and find
it difficult to get to meetings, please contact a committee member to arrange
transport. Usually there is someone living near you who can offer a lift.
So what have the committee come up with for the August meeting?
Club Contacts
Editor:
Steve Adamson
August Club Meeting Wednesday 30
Presentations
(03) 379-1918
editor@appleusers.co.nz
Assistant Editor:
Christine Chapman
(03) 942-2634
xtine@paradise.net.nz
Web Editor:
Peter Fitchett
(03) 960-8189
web@appleusers.co.nz
Email Lists Administrator:
Raewyn Saunders
(03) 337-9305
listadmin@appleusers.co.nz
To subscribe to either HELP or AUGC lists contact raewyn@digitalfusion.co.nz
AppleByte page 28
The Apple World Wide Developers Conference was held
earlier this month where we were introduced to the latest version of the
Operating System Ten saga, labelled “Leopard”. As mentioned Leopard
is still rubber stamped “Top Secret” but that did not stop Steve Jobs from
showing us some previews.
Listing ten new innovative improvements such as Time Machine,
iChat, iPhoto, Leopard was given the release date of Spring (northern
hemisphere).
The transition from Power PC to Intel has now been completed with the
release of a dual “dual core” Xeon processor based Mac Pro desktop system.
For more detailed info go to:
http://events.apple.com.edgesuite.net/aug_2006/event/index.html
• WWDC News and Additions
• Google Earth
• Spreadsheets
• The Mighty Mouse
• iPhoto part 2 - Creating slideshows and Sharing and printing photos
Workshop
• Spreadsheets
• MacBasics
• WWDC
Raffle: a choice of a red or a white bottle of wine - both good!
Every month the AUGC committee meet to prepare the monthly meeting
and at times we are finding it difficult to prepare subjects and topics for
the meeting so if you have a topic and or hardware that you would like to
know more about please let a committee member know.
I hope to see you all at the August meeting
AppleByte page 1
iPhoto Presentation
SeniorNet Mac
At July’s club meeting David Chilvers introduced
the first in a series of tutorials on iPhoto, Apple’s
outstanding digital photo cataloguing software with
“Importing photos” and “Organising photo albums”.
iPhoto is a principal component of the iLife package which comes bundled
with MacOS X.
We also hold social events on an occasional basis, and a newsletter is
supplied to members every two months.
Using iLife 04’s excellent DVD presentation, we were guided step-by-step
through the basics of downloading digital images to iPhoto, labelling them
(a tedious chore which is actually easier on-screen than writing on the back
of normal photos), deleting the fuzzy or misjudged images, placing the good
ones in whatever order is desired, and sorting them into albums from the
photo library. For those who use Playlists in iTunes, Apple’s music software,
the use of albums will be very familiar.
In contrast to the digital cameras most of us possess, iPhoto is sublimely
easy and intuitive to use, as you would expect from an Apple product. David
will cover part 2: “Creating slideshows” and “Sharing and printing photos”
at our August meeting.
Computer Training Lessons: Two-hour sessions, once a week for four
weeks. Course notes are provided. Classes are small with a maximum of
six students and two tutors per lesson.
The Learning Centre is situated in the Cranmer Centre Poolhouse, which
is accessed from Montreal Street at the Armagh Street corner.
Contact: If you would like to join SeniorNet Mac and are in the 55plus age group, please contact Tom Mitchell, at (03) 338 9837 or email:
t.mitchell@snap.net.nz, or else leave a message on the club’s answerphone
at (03) 365 2003.
–––––––––––––––––––––––––––––––––––––––––––––––––––––––––––
Submitting your article
Please write a tip or two for the magazine - everyone in the club should be
able to write at least one tip or article a year or at least send in an interesting
website.
Send material to editor@appleusers.co.nz
No need to wait for the deadline - early articles are very welcome :-)
Submitting Articles — Electronic submissions only, no paper thanks!
Any file format is fine, if I can’t open it I’ll let you know. 1 page of text
is approximately 340 words, please trim your articles to around 4 pages
or less (including graphics).
Please make sure the articles are written as clearly as possible, and use
your spellchecker. Also, if quoting from other articles please state your
source clearly.
Submitting Pictures — Please send as a separate file if you can. For
screen snapshots, I recommend you download Snapz Pro from www.
macdownload.com and save the picture as a jpeg or gif.
Photos should be supplied ready to use: high quality, cropped, resized to
10cm wide x 18cm high (or smaller!), saved as jpeg and submitted with
a caption.
Next Deadline: Tuesday 12 September 2006
AppleByte page 2
AppleByte page 27
“The killer application for the PC was the spreadsheet, for the Mac it was
desktop publishing and for the Internet it was the web,” said Paul Kunz. He
added: “Tim Berners-Lee was working on a problem to solve in high-energy
physics but in finding a solution he found a solution to problems that the
general public did not know they had.”
In late 1994 web traffic finally overtook gopher traffic and has never looked
back. Now there are almost 100 million websites and many consider the
web and the net indistinguishable. But, said Mr Groff, only now is the web
meeting the vision that the pioneers had for it.
The original conception was for a medium that people both read and
contributed to. New tools such as photo-sharing sites, social networks, blogs,
wikis and others are making good on that early promise, he said.
New Microphones’ Debut
The new microphones were pressed into service at last
month’s meeting. One suffered from occasional drop-out
but the other performed flawlessly. The drop-out problem
is caused by the way speakers hold the microphones. We
are investigating whether we can adjust their sensitivity to
cope with our quietly spoken presenters. The alternative
is to select stentorian speakers.
The web may be worldwide but it is only just getting started.
–––––––––––––––––––––––––––––––––––––––––––––––––––––––––––
15% DISCOUNT SEE BELOW 15% DISCOUNT
The cheerful face of AUGC member, Gilbert Wealleans, well
pleased with another profitable evening meeting and happy
to pack the furniture away.
Text & Photos by Euan Kennedy
___________________________________________________________
July Raffle
248 St Asaph St.
Ph. 03-377 5582
Nigel Cooper offers the first two customers to book
using this advert to receive 15% discount!
AppleByte page 26
Another successful raffle at July’s meeting, when the
prizes offered were a choice between a book from
Peachpit Press titled; ‘uptospeed Photoshop CS2’,
donated by Jim Fitchett or a bottle of wine. The draw
was won by a surprised but very appreciative Lorelie Kennedy who chose
the book.
AppleByte page 3
Member Profile
Euan Kennedy
This month we resume the profiling of club members.
In time we hope to hear about you all. For now we
begin with our erstwhile two-term Vice President,
Euan Kennedy.
Editor: Euan, how do you fill in your days between AUGC activities?
Euan: I’m a PhD student at Lincoln University analysing the long-term
viability of Chatham Island black robins. My study is really a belated
attempt to square off 28 years of commitment to these enchanting birds
and the many other endangered species I’ve been privileged to work with
as a wildlife management specialist.
Editor: When were you first introduced to Apple computers?
Euan: A friend in Dunedin encouraged my wife Kate and I to buy a
Mac Plus instead of a PC. That was in 1988, I think. Being an outdoors
hedonist—essential for sanity in my occupation—I really wanted nothing
to do with computers. I feared that having one would make me into a flabby
office worker. And the Mac Plus cost $4000! But that little 9-inch screen
won me over. It was probably the best companion I could have had for my
timorous journey into the ‘wilds’ of computing.
Editor: What machine do you use now?
Euan: Well, this is a little embarrassing because I’m still using an old
PowerMac 7300/180 at home, running MacOS 9.1. Not by choice, mind
you. While I’m a student, Kate (aka The Treasurer) is not at all sympathetic
to my regular keening for an upgrade. The PowerMac has a 400 Mhz G4
accelerator card and tonnes of RAM, so it’s reasonably quick. Unfortunately,
it sits alongside our teenage daughters’ two PCs on our home network. I find
them awful to use and maintain, but they’re very much faster, with more
commodious hard disks.
Editor: What would you like to upgrade to when you can?
Euan: Yes, the end is nigh for my faithful Mac. Too many websites won’t
recognise its creaking software and SCSI parts are scarce. I haven’t tortured
myself thinking about new Macs (yeah, right) but I do have an upgrade
project in train. Bit of an experiment really. I’m converting an orphaned
PowerComputing tower (acquired for its 20-inch Apple monitor) to run
MacOS 10.3 using XPostFacto. I plan to install a Crescendo 700 Mhz G4
accelerator card. A Mac-mad brother-in-law in New York has found the
other necessary components quite readily available in the US.
AppleByte page 4
Audience share
But though physicists were being won over by the web’s promise, in the
early years few others grasped its potential. This was because, said Mr
Kunz, many other technologies existed that did a similar job. Many people
got hold of key documents using the File Transfer Protocol (FTP) and used
Usenet as a means to express themselves.
Particularly popular was a technology known as Gopher developed at
the University of Minnesota that also put a friendly face on the blooming
complexity of the computers connected to the Internet. It got the name partly
because the college’s sports team is called the Golden Gophers. Gopher
was released in spring 1991 and for a few years statistics showed far more
gopher traffic was passing across the net than web traffic.
During this time Mr Berners-Lee, Jeff Groff and colleagues involved in the
world wide web project were evangelising their creation at conferences,
meetings and online. The whole project got a boost in April 1993 when the
first PC web browser appeared. It was created by Marc Andreessen at the
National Center for Supercomputing Applications at the University of Illinois
rather than at Cern because, said Jeff Groff, the web team did not have the
staff available to write browsers for PCs, Macs or Unix machines.
Mosaic was so successful that it established many of the conventions of
web use still around today, said Mr Groff. For instance, he said, the original
conception of the web had no place for bookmarks or favourites.
Also in 1993, the University of Minnesota began charging for Gopher, which
led many people to consider alternatives far more seriously.
Express yourself
Ed Vielmetti, a pioneering web user and now a research associate at the
University of Michigan School of Information, said during these early years
the technology really started to prove its usefulness to average net users.
Gopher and FTP systems were typically set up by companies or large
institutions, he said. Also Usenet lacked any kind of persistence so anyone
making a point had to re-post their opinions regularly.
Early on people started to use webpages as a way to express themselves in
a way that other technologies simply did not allow. Mr Vielmetti said web
code was very tolerant of mistakes and encouraged people to play around
with it. “Websites filled this unique little niche for you as a person, not as
a corporate entity, and you can have the page sitting there and have it be
yours,” he said.
Every surge of interest in the web has been driven by the appearance of
tools that make this expression, or a new type of it such as blogging, far
easier than before.
The foresight of Mr Berners-Lee and the pioneering coders was such that,
even today, many early webpages can still be viewed. That persistence can
last decades.
AppleByte page 25
How the web went world wide
by Mark Ward, Technology Correspondent
Courtesy of BBC NEWS: http://news.bbc.co.uk/2/hi/technology/5242252.stm
In a few short years the web has become so familiar that it is hard to
think of life without it.
Along with that familiarity with browsers and bookmarks goes a little
knowledge about the web’s history. Many users know that Sir Tim BernersLee developed the web at the Cern physics laboratory near Geneva. But few
will know the details of the world wide web’s growth - not least because
the definitive history of how that happened has yet to be written.
Zero to hero
One key date is 6 August 1991 - the day on which links to the fledgling
computer code for the www were put on the alt.hypertext discussion group
so others could download it and play with it.
On that day the web went world wide.
Jeff Groff, who worked with Mr Berners-Lee on the early code, said a very
simple idea was behind the web. “The vision was that people should not have
to deal with the technology stuff,” he said. The web was an overlay that tried
to hide the underlying complexity of the data and documents proliferating
on the Internet. Early on this commitment to simplicity meant that the now
familiar addresses beginning http:// were never seen.
In the early 90s a single way to get at the information stored on many
different computers was very attractive, said Paul Kunz, a staff scientist
at the Stanford Linear Accelerator Center (Slac) who set up the first web
server outside Europe in December 1991.
At that time, he said, computers were islands of information. A login only
gave access to that machine’s resources. Switching computers meant
logging in again and probably using a different set of commands to find
and retrieve data.
The web really caught Mr Kunz’s interest after Tim Berners-Lee showed
it querying a database of physics papers held on an IBM mainframe. “I
knew what the results should look like on the screen and the results looked
identical in the web browser,” said Mr Kunz. The web server set up by Mr
Kunz let physicists trawl through the 200,000 abstracts more easily than
ever before.
This proved so useful that soon even Cern scientists were querying
the database via the Slac webpage rather than using the copy on their
network.
AppleByte page 24
Editor: Now that project would make an interesting article for AppleByte,
don’t you think? Tell me, what do you use your computers for?
Euan: At home? Mostly word-processing. Oh and the internet of course. I
use that extensively when studying from home for university library access
and other research. TradeMe is a spare-time addiction but I also subscribe
to newsgroups and list-servers populated by people who share my interests
in aviation history, flight-sims and maintaining Mercedes diesel cars. The
Diesel-Benz discussion group gives me valuable advice for my cherished
Mercedes classic. Soon, at Lincoln, I’ll be using the G3 Sally generously
offered me to run pedigree-mapping software for my black robin studies.
Editor: OK. Last questions. When did you join AUGC and what do you
most value from belonging to the group?
Euan: I joined in 1991 or 92, I think, soon after we moved from Dunedin
to Christchurch. In those days we met at the Christchurch College of
Education. There always seemed to be crowds at those meetings, but the
group has become smaller since the internet arrived in force.
What do I value most from belonging? Two things. Advice and help from
other members, many of whom have the most amazing knowledge and
willingness to share it. Meetings are enjoyable social events too. I find them
very reaffirming in the pleasures and society of Mac computing.
Because the club has helped me so much, I’ve been happy to reciprocate
through tours-of-duty on the committee. That’s been a great learning and
social experience too. Among other things, it’s got me completely over the
intimidating belief that everyone else is a Mac expert. Well, I may still know
diddly-squat about Macs, but I see now that our group values contributions
of all kinds. Besides, asking for help is expected. If none of us asks, the
group has no purpose. And it gives others real pleasure to help.
Editor: Thanks, Euan. Good luck with your studies and with your appeals
to the Treasurer (will she be reading this?).
Euan:
I’ll make sure she does.
–––––––––––––––––––––––––––––––––––––––––––––––––––––––––––
AppleByte page 5
DejaMenu
by Sally Tripp
DejaMenu is a useful little utility and it’s free. It even
has heart! It’s programmer Karl Hsu asks, “If you like
DejaMenu, do something nice for someone.”
At the press of a configured keyboard command, floating palettes of the
current application’s menu appear at the tip of your cursor. So instead
of navigating to the top of the monitor to click what you need from the
menus you can do it right alongside where you are working. This is particularly useful if you are working with an extra monitor and the menus
are at the top of the monitor furthest away from you.
The default command is Command Shift M which is a bit tricky if you
are right handed and want to hit that and work with the mouse at the
same time. I’ve tried using other combinations, but I don’t know what’s
already been assigned. The uncommonly used Control key combined
with another key just doesn’t work. This little hiccup, however, doesn’t
detract from the usefulness of the programme.
For more about DejaMenu and how to get it, go to:
http://homepage.mac.com/khsu/DejaMenu/DejaMenu.html
Websites
Some of the many sites and articles on security. Google for many more.
www.macworld.com
www.macworld.com/2006/06/features/protectfw/index.php?lsrc=mwrss
www.macworld.com/news/2004/11/02/mi2g/index.php
www.macdeveloper.com
www.macdevcenter.com/pub/a/mac/2006/06/20/wireless-security.html
www.macdevcenter.com/pub/a/mac/2005/08/19/clamav.html
www.macdevcenter.com/pub/a/mac/2004/02/20/security.html
www.grc.com – home of Shields up, which can be used to test how open
your ports are
www.eweek.com/article2/0,1895,1979388,00.asp
www.ipr.res.in/synergy/compsecurity.html
arstechnica.com/articles/paedia/malware.ars/1
www.unwantedlinks.com/macsupport.htm
www.stuartallt.com/security/index.html
bastille.linux.org/jay/ – has a link to a slideshow on hardening up your 10.4
system to make it more secure
http://www.dnsstuff.com/ - general DNS and TCP/IP related lookups etc.
(some can also be done using Network Utility)
http://www.hackercheck.com/
Acknowledgements: Thanks to Bart Hanson for some comments and
additional websites
Disclaimer -The writer can’t claim to be an expert in security matters. The
article and the earlier presentation are intended as a starter document for a
discussion on security issues on Apple computers. Feel free to raise these
issues (and ones not covered) on the mailing list or at club meetings.
AppleByte page 6
AppleByte page 23
Tools to test your own set-up
For those who are paranoid about security or just like to find out what is
going on the following tools may be of use. Proceed with caution.
§
Intrusion detection tools such as Checkmate
§
Rkhunter – rootkit revealer, runs in terminal
§
Probe check
§
Macsniffer
§
Interarchy
§
Network Utility
§
Failed password checker
§
Henwen
§
Little Snitch
§
Who’s there –Reads, analyzes and sorts firewall log entries
Seek expert help when things go wrong. If the worst happens a reformat
of the hard drive and reinstallation of the operating system from the
installation discs or an earlier clone might be required. A reinstallation due
to an infestation of malware is unlikely due to the current sparsity of such
‘treats’ for Apple computers. However, don’t get too complacent and think
you don’t need to take precautions. Take some, a few. You could spend a
lot of time and money locking down everything to prevent anything bad
occurring to the extent the computer becomes difficult to use, you forget
what you have done and it becomes no fun at all. You could also worry
yourself into a tizz about all these nasties and worry even more when you
read the output of the tools without full understanding, as some of us do.
You can also forget what you have done/installed or changes made to the
system can slow it down.
Radio NZ Podcasts
by Sally Tripp
In the recent discussions about Podcasts at a club meeting
it was noted that what Radio NZ called Podcasts was in
fact live streaming. I’m happy to note that it is possible
now to subscribe to programmes through iTunes.
First go to www.radionz.co.nz and look at the left hand
column that is headed by “Find your way around” and
below that you’ll see RSS & Podcasts. Click this link and
it takes you through to a list of Programmes. Choose your
favourite programme or presenter such as “Nine to Noon”
and that takes you to a list of the available podcasts. On the
right of the page under “Actions” is an option to Subscribe
to iTunes. I haven’t yet worked out the simplest way to do
that yet. But with a bit of clicking here and there I’ve been
able to get it to open in the Podcasts folder of iTunes and
I got more than I needed. What I didn’t want I deleted and
I’ll listen to the rest when I have time.
–––––––––––––––––––––––––––––––––––––––––––––––––––––––––––
Computer free to a good home
Powermac 7200 with HP printer to give away. Runs at 120mhz with 48mb
of RAM and a 1.2GB harddrive. Runs System 8.1. Has limited software
but comes with discs and manuals for Word/Office versions 4-6. External
fax modem. Suitable for emailing and writing letters. May be good as a
computer for child’s homework etc. Has scsi, serial ports, ethernet and
comes with 3 pci slots. Tel: 9423000
Belinda
–––––––––––––––––––––––––––––––––––––––––––––––––––––––––––
Three photos seamlessly joined of Jean’s rug window promotion at Ballantynes
- by Jim Pollard
AppleByte page 22
–––––––––––––––––––––––––––––––––––––––––––––––––––––––––––
Obituary
It is with regret that we record the passing of Ron Johnson.
We pass on our condolences to his wife Marion.
–––––––––––––––––––––––––––––––––––––––––––––––––––––––––––
AppleByte page 7
Applesoup
by Bart Hanson
No iPhone or Asteroid, yet...
The run up to this years Worldwide Developers
Conference (WWDC) has been interesting more for the
background machinations than for the eagerly awaited
keynote announcements. Steve was still able to wow us
with a new Mac Pro to replace the (aging?) PowerMac
G5. Apple has transitioned its entire line to Intel now,
in just 210 days as Steve enjoyed telling us. To power
the Mac Pro desktops Apple chose dual-core Xeon
server processors. The 64-bit chips, formerly code-named “Woodcrest”,
pack a 4MB L2 cache and run at speeds of up to 3.0GHz on a 133MHz
front-side bus. Every Mac Pro in the lineup features two of the Dual-Core
Intel Xeon processors.
The redesigned enclosure holds up to four HD’s and 2TB of storage, 8
DIMM slots for 16GB of RAM and bays for two SuperDrives. Extra I/O
ports on the front panel now give two USB, one 400 Firewire and one 800
Firewire.
The Xserve also received a makeover with a 5x performance boost over
the Xserve G5, thanks to quad-core 64-bit Intel Xeon processing. Other
features include up to 2.25TB storage, two eight-lane PCI Express slots,
dual onboard Gigabit Ethernet and a combo drive. Internal ATI Radeon
X1300 PCI Express graphics is included with a mini-DVI output with VGA
support. Dual redundant power supplies give extra piece of mind.
AppleByte page 8
Useful Tools and Tips
This sketch of the Wild Wild Web may scare some users but it is “only”
your data at risk and a few precautions will keep the nasties out and retain
the fun aspect of computing.
Choose which options to follow:
• Brain in gear/commonsense
• Make an effort to keep up to date on security issues
• Install security updates to the operating system and update applications
and security utilities regularly
• Use a special email address for online activities eg: newsgroups for
privacy reasons
• Download software from reputable sources. Stay away from peer to peer
file sharing sites and software
• Activate the Mac OS Firewall and if you are concerned about programmes
phoning home (Apple, Adobe, Microsoft, Skype) Little Snitch is an effective
but sometimes annoying way of blocking outward traffic.
• Use a hardware router with built-in firewall for broadband access
• Install third party internet security software
• Run an anti-virus programme in the background or manually to detect
malware. ClamavX is free.
• Use Macscan to detect trojans and spyware
• Use a password to login at the start. Make them long using 10 digits, with
mixture of numbers and special characters and change frequently
• Do not open email attachments unless you know who sent it AND they
mentioned the attachment in the email.
• Emails travelling the Internet can be intercepted and read but not emails
encrypted through programmes such PGP
• Turn off embedded images in email
• Firewall – Club member and Mac specialist, Bart Hanson suggests that
you don’t rely on OS X firewall, because it will only keep out intruders
from THAT machine. Instead turn on SPI (Stateful Packet Inspection) on
the Router. This protects all machines on the local network and allows all
outbound traffic unless specifically blocked and denies all inbound traffic
unless specifically allowed. NAT will also do a great job of masking the
IP addresses of machines ‘inside” the router/firewall. If you don’t have a
router Magnum Mac or Dick Smith will be able to supply
• Complete regular and bootable backups with Carbon Copy Cloner, or
similar, to an external hard drive to guard against data loss
AppleByte page 21
Spam – Unsolicited mail is mainly a nusiance
as it clutters up mailboxes requiring additional
software such as Mailwasher, Spamsieve or
PopMonitor to run between computer and
your ISP mail server and time and effort to
set up mail rules to prevent its entry or clean
up afterwards. However some spammers
have linked up with virus writers to find ways
to bypass protective barriers and get their
message through.
Cookies – opinion varies on these little text files apparently designed to
make browsing easier and faster. You can block them but it will probably
cause access problems. It wouldn’t hurt to clear out unrecognised cookies
every now and then through the browser’s preferences. They don’t cause
damage but they are a privacy worry for some people.
Mac OS 9
The firewall under OS X does not work for 9. If your Internet Connection
is broadband (adsl or cable), a firewall like Norton’s Personal Firewall is
needed. Several years ago, I was horrified to find after three weeks with
broadband and no protection, how much traffic was attempting to access
the computer every minute. They still try. Clamav is available to detect
viruses on System 9.
Steve, (with some help from Phil Schiller, Senior Vice President of
Worldwide Product Marketing, Bertrand Serlet, Senior Vice President
of Software Engineering and Scott Forstall, Vice President of Platform
Experience) introduced ten new features of Leopard.
Some say Steve has put the Computer back into Apple and the keynote
certainly sounded that way to me. Not a mention of how many billion songs
ITMS had sold or any talk of total world “music player” domination.
One of the ten new features in Leopard was using “Web Clip” (in Dashcode)
to create dynamic Widgets from portions of web pages. Just such a tool
was released one day after the keynote! http://www.fondantfancies.com/
blog/3001239/
Time Machine, Spaces and Core Animation all impressed me (Time
machine utilises CoreAnimation’s Library-API’s) but Steve’s “biggie” Mail
Templates (HTML mail? Yuck!) Notes and To Do’s in Mail are the type of
thing I feel are best left to shareware developers. Spotlight gains boolean
searching (yah!) but the searching of mounted network volumes is something
it can do already so it beats me what the big deal is here.
Wireless networks
If you run your own make sure others can’t use it without authorisation by
setting up WEP, an encrypted password login control system. If using public
wireless broadband, make sure your firewall is on. Outsiders can access the
network if it is not properly set up.
On the PC side
Malware on the PC side won’t affect the Mac but you may have to reformat
any PC partition affected so don’t store data there. If you are running
Parallels Workstation or Bootcamp and Windows save the Internet for the
Mac or investigate relevant software such as virus protection and spyware
detection. There is a plenty of software available.
Apple will ship the OS 10.5 (Leopard) early 2007 (probably after Vista
ships) but it looks like “virtualization” will be left for parallels and VMware
to slug out. Phil Schiller says Apple will not do virtualization.
Anything else?
Potentially any application or object could be used: jpegs, the browser’s
helper applications like Acrobat Reader, Microsoft word macros, even
quicktime. And there are potential threats from the unix side, which is
outside the scope of this article.
AppleByte page 20
Bertrand Serlet observed that Vista’s logo is very aqua-like, but Vista is
“still Windows” with the ugliness of the Registry, DLL hell, and Product
Activation was a nice touch.
AppleByte page 9
10 New Features in Leopard in Brief
1. 64-bit application support
2. Time Machine
3. The Complete Package
4. Spaces
Time Machine
a) keyloggers – are small software items, usually downloaded unwittingly
as Trojans. They record everything typed on the computer, including
passwords and other useful and compromising data, which is then sent
to another address. Keyloggers can also take the form of a dongle (small
piece of hardware) connected between the keyboard and computer, storing
every keystroke.
5. Spotlight improvements
6. Core Animation
7. Accessibility improvements
8. Mail improvements
Spaces
9. Dashcode and Dashboard
improvements
10. iChat improvements
Core Animation
AppleByte page 10
Hackers and Crackers – Hackers, who are largely benign, just like
playing around with computers and pushing the limits to show off to others
what they can do. Crackers deliberately try to break into computers to
steal information and cause damage but both groups are often erroneously
labelled as Hackers. Crackers have a number of tools they can use including
rootkits, trojans, port scanners, password guessers, phishing and keyloggers.
They look at unguarded ports on a computer and vulnerabilities in software,
weak passwords and use social engineering techniques (talking or tricking
an unsuspecting employee into divulging a password) as well. Sometimes
hackers find employment after demonstrating security lapses to the
businesses involved.
b) rootkits – these nasty pieces of software can be used to gain control over
the computer, allowing a cracker to control the Root or superuser login.
Rootkits delete things like log entries, enabling viruses, trojans and worms
to hide their tracks. They are not easy to detect but rootkit revealers such
as rkhunter, which runs through the Unix side rather than the Mac OS,
indicate small changes in files that may suggest the presence of a rootkit.
A rootkit was used when some hackers wanted to demonstrate how easy
it was to take over a wirelessly connected laptop at a highly publicized
event in the US.
c) port scanners – use brute force to locate vulnerable ports left open and
unprotected. Any application capable of doing a tcpdump (Interarchy for
example or Network Utility) will reveal hundreds of attempts per second
by automated bots trying to gain entry. If you set up the firewall in stealth
mode (use the Advanced tab on the Firewall tab) it won’t reply to these
scanners. Also switch on the logging and check UDP while you are looking
at that dialogue box.
d) remote administration – Not only can hackers make use of file sharing
and remote administration software already on computers, but trojans can
also add remote administration software so it pays to have a good password,
disable autologin so it requires a password, and a good firewall, especially
if allowing remote access (in System Preferences: Shared folder). Any
computer with remote login enabled is vulnerable. The Symantec website
has a free online security echeck to see how vulnerable you might be to
hackers and trojans. Some common ports will be listed as open, closed or
stealth.
AppleByte page 19
Trojans - Trojans (or trojan horses)
are impostors—malicious programmes
masquerading as something desirable. When
triggered (sometimes by the opening of an
email attachment), they cause loss, or even
theft, of data. OSX.Exploit.Launchd is a proofof-concept Trojan exploiting a vulnerability
that has been fixed in 10.4.7. Third party
software Macscan is purported to be able to
detect and expel Trojans.
Technical website ars technica groups together some bad software under the
name of malware, including adware, spyware, highjackers, toolbars and
dialers. Adware places ads on screens sometimes, even without the browser
being open. Spyware sends details of websites you visit, contents of email
address books or even credit card details to another computer elsewhere.
Hijackers control what homepage the browser uses and redirect the user
to compromised sites. Helpful extra toolbars often offer to integrate into
Internet Explorer but some are bad ones. Dialers set up dial-up modems to
call 0900 numbers earning the owner of the number money and the victim
a large phone bill. Malware pose security risks and because they are badly
written make the computer operation unstable and can bring popups with
adult sites and scams onto the screen. The good news for now is that this is
a PC problem only and can be avoided by using a Mac. Although there is
little malware for the Mac it is getting more and more sophisticated and more
difficult to sniff out. Macscan is also a spyware detector on the Mac.
Wait there’s more:
Nigerian scams and others designed to extract personal information such
as name, address, phone, email and bank account number by promising
large sums of money to share or pay to you as a helper’s fee.
At the beginning I mentioned that there were some rumblings prior to
WWDC. Remember the audio breakout box, code-named Asteroid? Apple
tried legal means to force Apple Insider and Power Page to reveal their
sources after blogging about this as yet unreleased product.
Apple won the first round of the legal battle but the case went to appeal
and the 2004 decision was over-turned in May 2006 with the help of digital
rights group the Electronic Frontier Foundation (EFF)
The deadline for Apple to contest this appeal ruling has passed and legal
papers filed by the computer maker suggest it will not pursue the matter
any further.
Apple owes much to its legions of fans who whip themselves into a rumour
frenzy before every MWSF and WWCD. This is very much a double edged
sword for Apple as it can be damaging to Apple when its thunder is stolen
by premature leaks.
At the January MacWorld Expo large banners proclaimed “Redmond, start
your photocopiers” At WWDC Steve quipped “it was a joke, but they took us
seriously” and this time the banners read “Introducing Vista 2.0.”, Hasta la
vista, Vista” and my personal favorite, “Redmond has a cat too, a Copycat”.
Boom! Boom! as Basil Brush (and Steve Jobs) like to say.
I have read on several blogs that Steve looked tired, this together with the
fact that he shared so much stage time with other Apple execs led some
to anticipate Steve may be stepping aside as CEO. I thought Steve looked
just fine and I find it a healthy sign for Apple that others can step up to the
plate when required.
Phishing – emails spoofing emails from your bank or Trade Me account
saying there is some security problem sending you to a website to enter your
bank password. Some banks now have session passwords as a result of this.
Being a Mac user is no protection. Both phishing and Nigerian scams use
social engineering to persuade you to do what they want. Phishing is one
aspect of identity theft and this is considered cybercrime.
DOS attacks – Denial of service attacks on servers. Hundreds of
compromised or hijacked PCs (zombies) inundate the targeted server
with multiple “packets” of data in a bid to crash it. Internet servers run
by companies thus targeted have to take the computer offline until they
strengthen their firewall. This can sometimes be accompanied by extortion
threats.
AppleByte page 18
Apple has reported a 48% surge in profits year after year, while holding
steady on iPod sales volume, which had been the subject of some concern
among analysts. For the fiscal third quarter Apple’s revenues came in at
$4.37 billion vs. $3.5 billion a year ago. Net income was $472 million, or
54 cents per share.
AppleByte page 11
Andrew Burke is a Kiwi with a great blog (below). I don’t know if I’ll
ever have a blog as action packed and readable as his is. I especially like his
description of his switch to mac and some of the issues he found. Mostly
though there seems to have been very few! Thanks for the Tips section too
Andrew!
http://www.andrewburke.orcon.net.nz/mac/index.htm
Mac-ad hip guy Justin Long says his pop-icon status grows
with every TV spot released by Apple... “If I had been
egotistical about the movies, I have been brought back to earth”
he says. “Nine out of 10 people who recognize me recognize
me from the commercials.”
Advanced Micro Devices has agreed to buy Canadian graphics chip vendor
ATI Technologies for US$5.4 billion (NZ$8.6 billion).
ATI makes revenue of between US$80 million and US$100 million a quarter,
selling integrated graphics chipsets for use on PC motherboards alongside
Intel microprocessors, says ATI chief executive officer Dave Orton.
AMD says the deal doesn’t threaten AMD’s relationship with Nvidia, ATI’s
main rival in the graphics space and an important AMD partner, and it has
no plans to lock out the company.
“We are going to keep our interfaces open to encourage people to use our
platform,” says AMD’s president and chief operating officer, Dirk Meyer,
contrasting the approach with that of its main rival Intel.
A really rough guide to nasties on
the Internet
by Belinda Carter
According to a recent article on the Symantec website “there are no fileinfecting viruses that can infect Mac OS X.” That’s good news but there are
a number of other potential nasties circulating. Although these mainly affect
PC users Mac users are not immune when the malicious programmers find
vulnerabilities to exploit. Based on an abbreviated presentation at the June
club meeting, this article looks at some of those nasties and some things to
do to make their presence on your computer short-lived. It is intended to
make you aware of the issue, rather than a detailed to do list. The key thing
is not to go overboard–you could spend a lot of time and money trying to
make sure your system is 100 per cent safe, when that is an impossible goal.
It can also make you paranoid and take the fun out of computing.
You can count on the fingers of one-hand examples of worms, rootkits and
other exploits targeting Mac OS X; there have been so few.
So what are these nasties?
Viruses - According to the Symantec website there are more than 72,000
viruses and not one of them can cause havoc on a Mac. Outlook Express
is the main culprit on Windows. Basically, viruses infect files within a
single computer but also have the ability to propagate or multiply each
time a program is launched or each time a connection to the Internet is
made. Viruses can be detected using software such as ClamXAV. (Highly
recommended). It’s free and if the definitions are kept up to date it will
happily protect your computer and removable discs in the background.
A new web browser for PC’s has been released but what makes it remarkable
is that it’s touted as Safari for PC users. It uses Apple’s Web-kit engine!
Read more at www.getswift.org
Macro viruses – are something that can only be caught by Mac users of
Word, and they live in the Normal Template adding themselves to each new
Word document created. Switch off macros, or use word processors from
companies other than Microsoft, and you are safer.
Apple Computer has decided to do away with its discussion support team, a
group of forum hosts that have monitored and moderated its user discussion
boards. The end result, however, has been a marked decrease in the quality
of discussions, and an increase in everything from rudeness to instructions
on pirating music and software.
Worms - worms spread copies from one server to another via email or
networks and sometimes via instant messengers. The only Mac OS X worm
identified so far, OSX LeapA, spreads via iChat. Mass-mailing worms
often use a technique called “spoofing.” They randomly select an email
address from the infected computer’s email contacts, place that random
email address in the “From” field, and email an infected email to another
computer. It is hard to know where the infected mail came from because the
mass-mailing worm does not use the email address of the infected computer
in the email it sends.
AppleByte page 12
AppleByte page 17
Mac Pro
The Mac Pro has been announced and the 2.66GHz model is on display in
our showroom in Carlyle Street. This marks the final stage in the transition
of Macs to the Intel architecture.
The Mac Pro is a high-end machine with four Intel Xeon microprocessors
on two chips. The case is very similar to the previous G5 model with the
addition of an extra optical drive bay and additional I/O ports on both the
front and back. The new Intel Xeon processors are more energy efficient
and this means that the large areas devoted to heat removal in the old G5
model can now be used for the addition of up to four internal hard drives and
extra space for larger PCI Express cards giving increased options for graphic
display cards. The RAM sits on their own risers and uses FB-DIMMs on
1.3GHz busses. These Fully Buffered DIMMs use a faster and more reliable
architecture increasing the overall performance of the Mac Pro.
Apple produce three models: 2.0GHz, 2.66GHz and 3.0GHz with quoted
performances of up to three times that of the Power Mac G5 Quad.
Model prices starting from:
Mac Pro 2GHz
1GB RAM/160GB HD/GeForce7300GT $4,476.38 inc GST
Mac Pro 2.66GHz 1GB RAM/250GB HD/GeForce7300GT $5,241.38 inc GST
Mac Pro 3.0GHz 1GB RAM/250GB HD/GeForce7300GT $7,052.63 inc GST
AppleByte page 16
Member Profile
Bart Hanson
I have been a Mac “fanboy” since 1992 when I would
explore Mac Classics at the Teachers’ College library or
wherever a Mac presented itself. I purchased a Mac IIsi
(colour!) from Ron Service in 1993 and joined AUGC in
the same year. I went to Polytech (CPIT) for two years to
gain the CBC qualification and later obtained my Apple
Engineer’s qualification online.
Since then I have worked for Digital Fusion Ltd and MacWorx Ltd. I am
now employed 0.8 FTE (80% full time employment) with New Zealand
Horticulture I.T.O but still do some work on my own behalf as Macintosh
Computer Services Ltd.
I enjoy blues music, especially slide guitar, philosophy and family life.
Success is getting what you want, happiness is wanting what you’ve got!
Cheers,
Bart Hanson
–––––––––––––––––––––––––––––––––––––––––––––––––––––––––––
AppleByte page 13
Latest Products & News from MagnumMac
by John Osborne - MagnumMac
WWDC
The Apple Worldwide Developers Conference has just “happened” in San
Francisco. This is a gathering for those working on producing software and
hardware for the world of Macintosh, to gather and exchange information,
as well as meet the Apple engineers and technical experts who present
the sessions over the 5 days of the conference. This, along with the other
Apple conferences around the world, are opportunities to announce new
technology, Steve Jobs delivers the main keynote address and this time used
it to announce the Mac Pro. (The replacement for the Power Mac G5.)
New On The Web
www.smaps.co.nz is the latest release from Sam and his mates at Trade Me
– just type in an address to see it displayed on the online map.
Also…
See what we have known all along and that an Australian “The Age”
journalist now knows at:
http://www.theage.com.au/articles/2006/08/14/1155407745917.html
Wireless Mighty Mouse
Wireless and Mouse – an oxymoron?
In 1963 Douglas Engelbart working at Standford Research Institute
developed a two-dimensional pointing device for his “oNLine System”
(NLS – look this up and see where the world wide web and the Mac OS had
their genesis). In 1970 he received a patent for an “X-Y Position Indicator
for a Display System”, it was intended that the user held the single button
mouse continuously in one hand while the other hand was used to type on
a five key chorded keyboard. Xerox PARC adopted the mouse, and added
three buttons, but intended the keyboard to be used with both hands with the
mouse only being used when needed. The first mouse for Apple appeared
with the Lisa in 1983 but was only commercially successful in the Macintosh
from 1984 onwards. Unfortunately for Engelbart his patent expired at this
time. The development of the computer mouse has continued steadily with
a range of variations now available and it is now estimated that there are
US$1.5 billion worth of mice sold annually. The name “mouse” came from
the fact that there was a “tail” wire dragging out the back of the computer
pointing device – but what about a cordless pointing device – perhaps it is
time to return to Engelbart’s original name of “bug”?
The Wireless Mighty Mouse gives all the functionality of the wired version:
touch-sensitive technology for right or left click; 360 degree scrolling
capability; a squeeze button to active Exposé, plus improved laser pointing
accuracy and Bluetooth connectivity with a 10 metre range.
Wireless Mighty Mouse
$138.36 inc GST
Apple has chopped off Mighty Mouse’s tail and replaced it with
wireless connectivity via Bluetooth 2.0
AppleByte page 14
AppleByte page 15