All posts by admin

Rolling Back Windows Updates

From time to time, Microsoft may release a Windows patch that causes issues with parts of operating system (printing, connectivity, stability issues). And to resolve those issues in a timely fashion, the patch may need to be rolled back (removed).

Steps for Removing A Windows Update Patch

  1. In the Windows search bar, enter: appwiz.cpl

    This will launch the dialog box for uninstalling programs and updates.
  2. Click on View installed updates

  3. Scroll down to the section titled: Microsoft Windows

  4. Click on the specific update to be removed
  5. Click on Uninstall

    It might take a few minutes to uninstall, and most likely will force a restart of the computer.

Password Management

With hundreds of accounts spread across the Internet, covering everything from social media to email to financial data, its important to have strong, unique passwords for every website.   But keeping track of those passwords is a huge pain.  Many people resort to storing their passwords on paper or a worse, in a document stored on a computer.

The best way to deal with all that account security is to use a password management tool.   Some of the most popular password management tools:

Things to look for:

  • Does it work on phones as well as laptops/desktop computers?
  • How much does it cost:  is there an annual fee or cost per device?
  • Can you synchronize the stored data between platforms (phones and laptops)?

Note:  Some browsers, like Google Chrome, can do a remarkably good job of generating, storing and recalling passwords.   However, that’s about all they can do — that can’t keep track of secret questions, birthdates, etc.

Security tips:

  • Always use strong, unique passwords.  A good password manager tool can generate strong, unique passwords for you.
    • Passwords should generally be composed of upper and lowercase letters as well as some punctuation and numbers, and should be at minimum eight characters long.
    • Every website should have a unique password — do not reuse passwords.
    • Don’t make up new passwords based on a variation of common root word (like bobby12, bobby12a, bobby5x).
  • Turn on two-factor authentication (2FA) for all sensitive accounts including financial, social media, and storage accounts.  Major accounts that provide access to key personal data like Google (gmail) and Apple accounts should definitely have 2FA turned on.

Apple Accounts

Many households that having been using Apple products, especially iPhones, iPads and the old iPods, share the same iTunes account (now referred to as Apple ID) so that all the family members can have access to the iTunes purchases (music, movies, etc).  However, this setup eventually leads to problems with synchronizing information across multiple devices.  In particular, contacts get shared with everyone, messages/texts may be randomly delivered, and incoming calls to Facetime will be echoed across all the devices.

The solution to these problems is assign every user their own iCloud account.   Some of the additional benefits of having an individual iCloud account include the ability to locate your lost iPhone/Macbook, saving of passwords and backups of photos, etc. This article outlines the steps to provide each user with their own identity, while still allowing purchases in iTunes to be shared.

Select a permanent email address

Like the shared iTunes account, an iCloud account needs to have an email address associated with it.   It’s best to use a good long-term email address, not a school or work address.  Google provides free email accounts as part of a Google account.  Most people use their full name as part of the address, like bob.smith@gmail.com or bsmith@gmail.com.  Make sure you have full access to this email account, as you will receive some verification emails during the iCloud signup.

Create an iCloud account

Create your own iCloud account using that long-term email address.

If you already have your own, unique iCloud account you can skip this step.

Remove the old iCloud account

On your iPhone/iPad:

  • Open settings -> General -> iCloud
  • Signout
  • Delete account

On your Macbook:

  • Open System Preferences -> iCloud
  • Signout

Add the new iCloud account

On your iPhone/iPad:

  • Open settings -> General -> iCloud
  • Sign in with new iCloud account

On your Macbook/iMac:

  • Open System Preferences -> iCloud
  • Sign in with new iCloud account

Make sure you use the same iCloud account on all of your devices (iPhone, iPad, Macbooks, iMacs).

Finishing Up

Review your iCloud settings and ensure the following features are turned on:

  • Photos
  • Contacts
  • Calendar
  • Reminders
  • Safari
  • Keychain
  • Find My iPhone / Mac

Also ensure Message is setup on your iPhone:

  • Settings -> Messages
  • iMessage turned on

Family Sharing (optional)

While using separate Apple accounts for iTunes and iCloud will allow the sharing of iTunes purchases, Apple now has an official sharing program called Family Sharing.  It allows one Apple ID to be the primary purchaser, and then shares all the iTunes items like music, movies, apps and Apple Music plans, with up to five family members. It also provides extra services like locating other family members iPhones / Macbooks, family photo albums, and a family calendar (share schedules).

If you decide to switch to Family Sharing, then one person in the family will take over the old Apple ID (iTunes) and use that for their own account.   That person will then turn on Family Sharing, and share with the other family members by adding their iCloud accounts.   The rest of the family members will switch their iTunes accounts to match their iCloud account.

Useful Links

The Internet of Things

Internet of Things (IoT) is the latest trend in the Internet saga.  IoT is basically the connecting of devices to the Internet for monitoring.  Initially, this was simple devices like webcams and smartphones.  But now IoT is the monitoring of just about anything.  One of the smallest and simplest examples is Amazon’s Dash buttons.  033115_AmazonDashButtonWith a single press of the button, the device sends a message back over WIFI to the Amazon motherland, letting them know you want to order more of that product.  Other examples include washing machines that let your smartphone know when the current load is done and the Nest thermostat, which observes your heating/cooling usage and adjusts its schedule dynamically, all while tracking and processing much of the information up in the cloud.

Looking at a bigger picture, IoT is be used by companies with their products to keep track of inventory and collect information on usage.  And all of this data has to be stored and processed somewhere, which is another growth industry.

For most people, one of the biggest and potentially most useful areas of IoT is home automation. Nest-1000x1000 Initially, the process can seem simple:  add a WIFI connected thermostat, or a few window and door sensors to detect entry.   But the real trick, as with all of IoT, is in the choreography of these devices.  With the right home automation setup, the system can warn you when the furnace is turned on but  you’ve left a window open and outside temperature will impact the furnace performance.    And going deeper, a home automation system can watch for movement within the household after 6 am, and then triggers the turning on of lights (if light levels are detected to be too low), turning up the furnace thermostat, turning off the alarm system, and turning on the coffee maker.  The interconnecting of these IoT devices, and the logging and processing of the data, can lead to some complex and powerful systems, which can help not only make your home safer, but save energy and add a lot of convenience.

However, as of fall 2015, we are still in the early adopter stage.   It reminds me a lot of the early days of the personal computers, when there were many producers but the complexity level of assembling and using them was still high.  Most early computer users had to build the computer from parts, how to load and run programs from a command line, edit configurations by hand and sometimes even write their own programs. And most people, at the time, thought they would never need a home computer.  Most of the advanced home automation systems are much the same way, requiring power users who are comfortable with customizing configurations and loading modules they have to seek out from user forums.  And again, most people don’t see all the potential of what these systems can do.  There is no clear home automation leader — it is the Wild West still, and one strong horse now could be off the track by next year.  Apple, Google, and many more have their fingers in the water, but haven’t produced significant efforts yet.

shop-app_900x600_monitoring-kit_final-2One of the early leaders is SmartThings, a kickstarter home automation system that has since been purchased by Samsung.   It provides a low cost, fairly open, and highly configurable system that accepts a large number of IoT devices.  But it also requires a solid tech understanding of the devices, and frequently custom device type configurations and coding speciality routines. It is one of the most popular systems with the techies, and when working properly, it can do some amazing and complex automation.  It’s the TRS-80 of the early IoT days…  can it be the IBM PC?  As of this writing, the company has been struggling to keep up with their fast growth, and the stability of their product has been suffering.

The next few years will see a rapid evolution in IoT, and automation, as these systems become more widespread, and we adapt to more and more technology in our lives.

Enter the Smart Watch Era

Dick Tracy smart watch

Samsung-Galaxy-Gear-6-colors-side-640x361The fall of 2013 ushers in a new era in this electronic age, the Smart Watch.  These devices bring the comic Dick Tracy wristwatch to reality with the ability to interact with your smart phone, including phone calls, text messaging and app interfaces.  Over the next few years we’re sure to see this market boom as the watch design improves.  All this leads to an even more integrated electronic connection in our lives.   And quite likely, an eventual market reduction in the “old school” watch market.

More details on the emerging smart watch market

Merging of Technology

Samsung Galaxy CameraSmartphones continue to accelerate the merging of technology. As an example, Samsung is planning a camera with the regular point-and-shoot lens, but married with an Android platform.  The camera will allow the user to instantly upload and share the photos as well.  Calculators, pagers, organizers, planners, GPS units and even cameras have all fallen victim to the rapid development of the smartphone.

More details on Samsung Galaxy Camera .

Life with Steve Jobs

With the passing of Apple’s iconic leader, Steve Jobs, I’ve come to realize how much history I’ve experienced over nearly 35 years with him.

My first experience with Jobs’ creations was back in high school, when we learned computer programming on the Apple II systems.   I was never a big fan of the Apple II , especially their spongy keyboards and strange key placements  (I was on the TRS-80 side of the fence), but I did some of my first color computer programming on them.  Technology has not always been met with open arms, and I still chuckle remembering the day we came into the computer lab and found someone had stabbed a pencil into the computer, like a dagger.

In college, I was fortunate to be right at the front of  the revolution of personal computing when Jobs turned out the very first Mac.  It was absolutely revolutionary.   In one year we went from typewriters to Word processing.   The simple Windows interface with an intuitive design was extremely simple for us college kids to pick up.  It certainly put my TRS-80 to shame.   It all seems very stone age now:  the original Mac systems had no hard drive so everything was run from floppy disks (insert one for Word Processing, then swap it out to insert another to save the file).  And all in just 128K of memory.

As my senior project, I went back to the Apple II (by then a relic in college library), and wrote assembly code for booting and saving data to a floppy disk.  Not particularly exciting, but I cut my teeth on machine instructions and low-level programming.  I also did some my first hardware hacking with the Apple II, using it in a club science project to control and display a model train layout.

The next huge experience with Steve Jobs was the birth of the World Wide Web.  My wife was in graduate school at the time when I learned of a new program called Mosaic, that was changing the way we accessed data online.  Up until then, almost all online access was via dial up connections to bulletin board systems (think forums and file downloads).  Mosaic was the first widely available web browser, and later become Netscape.  I can still remember going into the graduate school to use their high-speed network on an Apple computer to download Mosaic for my home PC (so for even a diehard PC guy like me, it was the Mac that opened the door to the web).

We purchased our first Mac during those graduate school years.   It was a Mac IIci, considered one of the first real workhorse Macs.  It had a decent amount of memory and even a hard drive, and yes, cost a small fortune (we took a loan out!).  My wife wrote her entire dissertation on that computer (and printed out on a HP Laserjet that we still use today!).

Like Steve, there was a number of years after that where I wasn’t involved in Apple products.   My world was filled with mainframes and minicomputers, and lots of PCs.  The Mac line-up seemed to flounder with the Mac OS 8 and 9 operating systems, and their designs weren’t drawing a huge following.

Jobs came back to me again roughly ten years ago when a person from our skiing community contacted me about problems with their PowerBook G3.   The computer had died and the local repair technicians told them the data was a total loss.   While I had had no recent experience with Mac systems, I offered my services.   Working with that PowerBook gave me a renewed confidence in my tech skills as I was able to access the hard drive and recover all of the client data.  That experience led to an every growing business of technical support and guidance, and eventually this web site.

I can still remember working with another client on Jobs first step outside the formal computer world, the iPod.  I assisted the client with the set up of their brand-new iPod U2 special edition, a black and red 20GB unit pre-loaded with the entire U2 collection.  An impressive device, and more so, a remarkable bit of foresight and salesmanship for Jobs to bring iTunes to reshape and dominant the music industry.

My revolutionary experience continued with Jobs’ mega-earthquake, the iPhone.  I can still recall emailing friends to let them know this phone was absolutely a game changer, heads and tails above everything else on the market.   The product almost immediately led to the collapse of Nokia and the counterstrike from Google, the Android phones.

In recent months, I’ve been back in the Jobs neighborhood again, this time reviewing and purchasing used MacBook Pro laptops for a number of clients.  The solid laptop construction and beautifully integrated OS X software still has all the hallmarks of Steve Jobs quest for perfection and clean design.

These days I see Jobs handywork everywhere, from reading the morning news on an iPad to listening to some tunes on the iPod Touch while working in the kitchen.

I will always look back very fondly on my days with Steve Jobs.   I know I have lived through the times with one who clearly will be viewed in history as a major founding father for much of the consumer technology progress of the last 40 years.   And I look hopefully for another person to step up and lead the way as clearly as Jobs did.

Bruce Adelsman
October 2011

The Future

At the 2011 CES show, Motorola rolled out an amazing new product, perhaps the most groundbreaking since the iPhone.   It’s called the Motorola Atrix.   And it represents the future of computing.

Basically, the cellphone is the computer, and by using simply docking units, you can switch to using it as a desktop computer, a laptop or even a home entertainment system.

Check out the Engadget article and especially watch the full video demonstration.   It really is amazing.

Game Changer

A new Firefox browser plugin released in late October 2010 is having a chilling effect on public WIFI surfing on the Internet.   The plugin allows anyone to simply use their web browser to discover and hijack access to many of the most popular websites while surfing on a public, open (unsecured) WIFI network.   In simple terms, this means if you surf the web from a local coffee shop or public library using unsecured WIFI (no password needed), then other users at that location can very easily gain full access to your web accounts like Facebook, Twitter and even Amazon. While this type of hack was possible in the past, it required a fair amount of technical prowess and specialized tools.    Now it is as easy as installing this freely available plugin — This really is a game changer for public WIFI web surfing!

What can you do?

  1. Whenever possible, avoid accessing any personal accounts (and email) while you are connected to an unsecured WIFI network.
  2. Try to only use WIFI networks that have encryption (should show a lock on the WIFI network when browsing, and will require a password/code to acces the network).
  3. Consider installing and subscribing to a VPN service.  A VPN service will encrypt all of your network communications, regardless of the type of network you are connected to.   Here are a few products/services: HamachiHotSpotVPN, TrustConnect.
  4. If you have the ability to access the web via your cellphone (a process called tethering when used with computers), then use that access instead.
  5. If your browser supports plugins, look for a plugin that will force encrypted sessions (SSL) for popular web sites. For Firefox, one plugin is called ‘HTTPS-Everywhere’ and Chrome has one called ‘KB SSL Enforcer’.   You’ll need to verify the website URL starts with ‘https’ (note the ending s) to ensure the connection remains secure for every page you visit.

Who is impacted?

Anyone using a computer (or ipod, cellphone, etc.) to access an open WIFI network.  All types of computers, all types of operating systems, are vulnerable to this attack as it occurs at a network level.   Again, an open network is one that is not locked (does not require a password).  Most public WIFI, like the kind at coffee shops, public libraries and even hotels, are open and unsecured!

Who is not impacted?

If you using computers at the public library that are not connected wirelessly (i.e. they use an ethernet cable), those are generally safe.  Surfing from your cellphone should be fine, as long as you are using the cellular network and not connected to a WIFI network.   If the WIFI network you connected to is locked (requires a password to make the network connection), then your surfing is safe.

More Info:
Video explaining more details on this plug-in and showing how simple it is to use.