Turn off Facebook Ad Tracking January 4th, 2015
I was getting annoyed that EVERYTHING I looked up was getting tracked by FB. I followed this link: http://www.wired.com/2014/06/facebook-ad-tracking/,
which took me to this site: http://www.aboutads.info/choices/
I’d already had an ad blocker running on my computer, but the cookies this site found were… PROLIFIC! I can’t block all cookies, ’cause some of my sites NEED them (people I teach for and such), but now, about 1/2 hour later – my feed and my ad list is very, VERY different. So much cleaner! Nice!
FREE Photoshop Techniques Ebook! May 23rd, 2014
Jeffrey Tranberry’s Adobe Blog has posted a VERY nice 214 page ebook about Photoshop Techniques. It specified “screen designers”, but the techniques and ideas can be applied to any media. You can find the download here: http://blogs.adobe.com/crawlspace/2014/03/pixel-perfect-precision-useful-design-tips-photoshop-techniques-for-screen-designers.html?PID=2159997 There are also “Extras” that can be downloaded for the book, which can be downloaded here: PPP Extras (scripts, etc., 0.5MB) Don’t you just LOVE FREE!!!
Is Your Email Account Hacked? January 26th, 2014
Today, I received an email from a well-meaning friend asking if my email account had been hacked. He forwarded the original email to me, and it was immediately obvious that “Hacking” was not what was happening here. The appropriate word for what was done is “Spoofing”. My name was Spoofed. (http://en.wikipedia.org/wiki/Email_spoofing). To see the email I received, please see the bottom of this post.
What this means is that someone, somewhere got my name and used a bogus email address to send email to my friend – showing my name, but not from my address. This is a very important distinction. Had they used my email address, even with a DIFFERENT name, I would have been “Hacked”. I’d have to change my passwords and worry about my email account’s security. In this case, there’s nothing I can really do, but at least my information is safe.
I’m sure you’ve all seen emails like this. Emails that appear to be from friends, but are promoting something you KNOW your friend wouldn’t promote, or that has some wonky link in it.
If you’re wondering why this happens, there are several possible contributors to the cause:
1) Sending batch emails to dozens of people or strangers and CC’ing all the emails, exposing everyone’s names and addresses to everyone else. This is easily resolved by using BCC (for a tutorial on BCC, please visit my YouTube Channel: http://www.youtube.com/watch?v=1DunBSu6mL0)
2) Using BCC in your emails, but forgetting to remove the dozens of email addresses that had been forwarded to you by others who didn’t know BCC
3) (This seems to me to be the MOST prevalent) Keeping your Contacts (or Address Book) on a free email server – like Gmail, Yahoo, Hotmail, AOL and others. It’s not too hard for a hacker to access your information from there :
To support this idea, I can see that my friend received his email on his gmail account. My name is listed on his gmail account as a contact. The link and actual USED email address have something to do with cars. My friend is very connected with the car business and has likely been tracked as we all are, while doing some of his research.
Some articles blame social media, however I’m not among the people who believe that to be the culprit. My personal name is not listed in full, as used in this email on almost any social sites. In fact, the ONLY place this name is listed in this way is in Google+ (in which Google has endeavored to link everything Google to everything ELSE Google).
So, my suggestion is to stop using Free Email addresses on public sites. Now, I know that’s not going to happen, so here’s the next best thing. Check the email information – and look for the email ADDRESS from which the email was sent. If the listing is as it appears in the screenshot below – IMMEDIATELY delete the email. DO NOT CLICK ANY LINKS! Then, consider removing your friend’s name from a public listing on your free email account, and consider using BCC correctly in emails to protect the names and emails of your friends.
1Password – is it going the way of all the other corporations? October 4th, 2013
Those of you who follow my posts on my page, or on Facebook know I’ve been a HEAVY supporter of 1Password, recommending it to my clients and students on both the Mac and Windows Platforms.
Well, I’m requesting data from the company as regards their newest upgrade – and it’s possible that I may be writing back with some news that may cause me to retract my support. Please keep watch.
For my students who’re color grading their footage using an external waveform monitor – Tektronix has just posted a Primer on Color grading theory and techniques.
AND, it’s my second favorite price- FREE!
Creative Cloud Backlash May 11th, 2013
SO many people are responding negatively to Adobe’s recent announcement of their sole offering of a cloud based Creative Cloud subscription that I’m seeing dozens of posts on the subject. The article below offers some links to follow the discussion (read: Rebellion), and a link to a petition to sign, if you find a life-long payment plan is not for you!
Posted in Adobe, After Effects, Blog Posts, Commentary, CSS, Design, Digital Photography, Dreamweaver, Effects, Illustrator, InDesign, Motion Graphics, Photography, Photoshop, Premiere, Print, Retouching, Reviews, Tips, Video Editing, Web Design | No Comments »
For Web Designers and Dreamweaver Users and Students May 11th, 2013
THIS is SO useful! A Unicode Character Table – interactive, online resource!
My GOODNESS this is going to help!
Get rid of that Space-Wasting “Other” on iPhone March 13th, 2013
I’m a Software Instructor and Mac Consultant – not an iPhone expert, so I was pleased to find an answer to a question today.
I have a 16GB iPhone 4, which has quite a lot of apps, music, video, photos and books on it. So, I’d expect to have a lot of space used on my phone. However, even with all this stuff, I was losing storage space to a “little item” called “Other” in my iTunes view of my phone – I was losing 2.6GB of space!!
I knew I could restore from a backup, but I’d just spent quite a bit of time clearing some photos and didn’t really want to spend an hour restoring from backup.
Fortunately, I found a very simple solution that worked perfectly:
On the iPhone, Go To “Settings/General/Usage/Music and then swipe left to right over the “All Music” entry and select Delete, then re-boot the iPhone.” He stated, ” you think it would delete all your music, but id doesn’t” (sic)
This was listed at: https://discussions.apple.com/thread/3418045?start=75&tstart=0
Research is my friend!
Some info for When you Finally Move to Mountain Lion March 9th, 2013
The Macworld Help Desk has a really helpful article about what to expect when upgrading to Mac OS 10.8 (currently 10.8.2) Mountain Lion. The article can be seen at http://bit.ly/10n5gNc
Personally, I haven’t performed this upgrade, but there’s really only one reason for this at this point. I HAVE upgraded to Lion (10.7) and do not particularly like it. It’s GREAT for new users, but for those of us who’ve been using the Mac for a long time, we have to jump through too many hoops to do anything with real control. This is the same issue with Mountain Lion, and from what I see, Mountain Lion has some improvements over Lion. So, you ask, WHY have I upgraded to Lion, and skipped Lion?
Well, I NEED my old applications that run in Rosetta. “But” (you say), “Lion doesn’t run Rosetta either, so how can this be a good reason?”
In my efforts to keep my old apps running, I found the ONE version of VMWare Fusion that allowed us to install Snow Leopard as a guest operating system so I can run my old Snow Leopard installation (my favorite OS so far, btw) in emulation – much the same way I run Windows. Now, I need you guys to know that installing Snow Leopard’s Client OS may be breaking the “letter of the law” unless you use the Server version.
The ONE version of VMWare Fusion that will allow the use of Snow Leopard’s Client (means end-user version) will stop working if I upgrade it, and the old version will not run on Mountain Lion – simple as that!
Oh, and I should tell you that I HAVE tried using the Server version of Snow Leopard in Parallels and VMWare. They work fine, but don’t have the same capabilities as they do when emulating Windows – they don’t allow copy/paste to work between environments, and they don’t allow drag and drop of files from the main environment to the virtualized one (a VERY helpful feature between Mac and Windows – non-existent in Mac to Mac emulation – can you believe it?!)
All this, so you can understand the implications of upgrading your Operating System on the Mac. It may not affect you as most of you have been using the Mac for a short enough time that you don’t have any older programs that require Rosetta. But if you do, you may wish to take heed.
Apple Malware Identified – Looks like we finally “Made the Grade” February 21st, 2013
It’s very rare to see Macs targeted for Malware and Cyber Attacks. In large part, it’s because the Mac OS is really quite a secure Operating System, based on UNIX and containing lots of built-in security controls. However, I believe another factor in it’s lack of focus by the “bad guys” was because it has always been a “smaller target” a less popular, less-used OS, because there’ve never been as many Macs out there as Windows computers.
This time, it’s not the OS that’s been targeted directly, but an addition to the OS, called Java. Java (developed by Sun Microsystems) is a programming language that’s used within operating systems to enable the development and implementation of many functions and applications that can work on both Windows and Mac systems (and others). It’s something we rarely see directly being used, but lots of interfaces interact with Java: in particular lots of web apps and games.
So, imagine my surprise when MacWorld released an article named “Apple confirms cyber attack, releases Java update and malware removal tool”. Don’t worry – there’s a fix already posted by Apple in their software update – but you should all know.
Read MacWorld’s article at: http://www.macworld.com/article/2028740/apple-confirms-cyber-attack-will-release-security-tool.html#tk.nl_macwk