Mac Tips from a Windows Guy

2015 September 1

I’m a Windows guy – I always have been.  I’ve used Apple products in the past, I mean I’m a tech guy for crying out loud.  I think my first resume was composed on a Mac way back in the computer lab at college, but my professional career has largely been Windows focused.

Until the iPhone cam along.  With the passage of just a few years, Apple products are everywhere and not just in pockets; iPads are commonplace in the enterprise and the demand for access to corporate resources through whatever device people have increases every day .  More and more that means Apple computers and devices.  With the continued maturation of remote access technologies like Citrix, and the increased use of virtualization for applications and desktops in the enterprise, BYOD is easier than ever to implement.  What does this mean for us mild mannered tech support guys?  It means we have to know Apple devices.

This turns out to be an awesome thing – Apple stuff is really good.  I know, duh, you say, and I hear you.  I’m not a naysayer cum fanboy yet, but I like what I see.

To that end, I’ve put together a little list of things that make navigating the OSX environment a little easier for us Windows Ham Handers.

  1. Ctrl-Home – in Windows, if you want to get the the top of a page, document, spreadsheet etc, you just hit Ctrl-Home.  On a Mac, there’s no Home key!  What to do?
    Fn – Left Arrow will get you there.
  2. F2 key to edit.  I use this one a lot – in Windows,  you hit F2 to edit the text in a lot of places – Cells in Excel, file names in Explorer etc..  How to do the same on a Mac?  This is a little trickier.For file names (in Finder) just hit the enter key to get to edit mode.For Spreadsheets is a bit application dependent.  For LibreOffice, Fn – F2 will put you in edit mode in a cell.
    For Numbers you can click in the cell to edit the text, or option-Return will put the cursor at the end of the text in the cell.
  3. Right Click – This may have been obvious to others, but it took me weeks to realize how to get a right click on my MacBook.  Simply two-finger tap the track-pad to bring up the right click menu.
  4. Open a second Finder window.  On Windows, I often have multiple frames for an application up at one time, especially explorer windows for file browsing.  On a Mac, it wasn’t immediately clear to me how to do the same.It’s quite easy – simply right click on the finder icon and choose “New Finder Window” from the menu.
  5. How do I save Word files from Pages?  If you have to live in both Windows an Mac land, you may have to edit documents on both platforms.  You can do this in many, many ways, the cleanest of which is to run MS Office on your Mac, but if you don’t want to pay for that, or your Office 365 subscription is Windows only (thanks Microsoft) then you may have to edit and save Word format docs from the Pages app on your Mac.  Lucky for us, that’s easy too -In Pages, click the File menu, then Export to then choose the format of choice – word, PDF, whatever floats your boat.  Note that for the most part Word formatting works well, but if you have a complex word document, I would not try and edit it in pages and expect that all formatting will work exactly as planned.  Caveat emptor here – if it’s complex formatting, stick to one format or the other – don’t cross the streams – it would be bad.

There are literally thousands of sites to explore looking for tips and tricks for Mac, this is just a tiny tiny sample from my personal experience.  Share if you find more stuff, and I’ll likely post more of these as I find them.

One thing I’ll mention is that the track-pad on a Mac is amazing as compared to it’s Windows counterparts.  Two finger gestures, swipes etc are intuitive (for the most part) and work really well.  Once you get get used to it, its very hard to go back to Windows clumsiness.


Inching ever closer to fan boy –

Add to RSS Feed Add to Technorati Favorites Stumble It! Digg It!

Password Best Practices – Protect Yourself!

2015 August 31


Been way too long since I’ve posted.  No apologies – life gets in the way.

I wanted to talk a little about password security and the need for two factor authentication.  As I’m sure you are aware, the internet is a scary place, and over the last few years information theft is hitting home for regular folks like you and me.  Home Depot, Target, Sony, Citibank just to name a few have all been hit with large scale targeted attacks where massive amounts of data were stolen.  Identity theft is rampant, and given that most people don’t think about passwords that much, its far too easy for bad people to get your data and do really bad things.

What can you do?

Three simple rules for Password Safety:

  • DON’T use the same password everywhere – I’ve done this so many times, and it is just asking for trouble.  Don’t give the bad guys the keys to the castle  when they break into the tool shed!
  • Use long passwords – the longer the better, but 8 characters minimum.
  • Use complex passwords – mix case, use numbers, use special characters (ampersand, asterisk etc).

How to I maintain secure passwords without driving myself insane or just writing them all down?

There are lots of ways to do this, and I’m not going to pretend like I know them all – but there are a few basics to remember

1) Use a hash

Simply put, this means use a base password that is always the same, then use the site name to generate something unique.

For example, make your base password something easy to remember like your favorite color or your nickname for your partner.  In this case, lets use “fido”.

I want to login to my mail account at yahoo.  I could make my password “fidoyahoomail”  or yahoodotcomfido.

I could get more secure if I split the keyword and added some special characters and replace letters with numbers: “fiy@hooD0” – note the o in fido was changed to a zero.

2) Don’t use all letters!  There are lots of creative replacements you can make for plain letters – use what makes sense for you.

replace all “e” with 3

replace all “a” with @

replace all “e” with # (shift 3)

replace all “o” with 0

replace all “s” with $

you get the idea

3) Use a password manager

There are many out there, but I really like Lastpass (  It’s cross platform so will travel with you to whatever device you want, will generate and store very complex passwords, and probably most importantly uses multi-factor authentication scheme from Duo and several other providers (more about that later).

The basic idea is that you store all of your passwords in one place then use a single password to get at your password “vault”.  I know, this is a single point of failure and what if the password manager gets hacked?  That’s a valid concern and if I’m honest I don’t have a good response other than it’s the best you can do for the moment.  Choose a site (like lastpass) that has good two factor authentication choices so that you reduce the possibility that your master password gets hacked – that way you just need to worry about Lastpass itself getting hacked which will never happen – oh wait

4) Use multi-factor authentication where possible. 

What is multi-factor authentication (also called two-factor authentication)?  Basically it means another way for the system you are trying to access to know that you are who you say you are.  Since passwords can be hacked, a second authentication means that you further reduce the ability for someone to hack the system.  In practical terms that can mean a lot of things – an email with a security code, a text message with a security code, your smart phone fingerprint reader, a USB key for authentication etc.  This is an evolving space, authentication methods are improving all the time.  Check out the FIDO alliance for more on second better authentication methods.

As an aside, when LastPass reported their breech, I was not concerned because I had two factor authentication turned on.  I changed my vault password anyway, but I was relieved that I was protected regardless of the breech.

A couple of DON’Ts are necessary to mention here too –

  • Don’t use names of people you know in your password – wives, children, relatives.  In fact, don’t use proper names at all.
  • Don’t use dates that are discover-able – birthdays, anniversaries.  Nothing that someone can find out if they google you.  You want to use the date of your first date with your wife, or the day your kid said “No!”  for the first time, that’s fine.
  • Avoid simple, easy to guess passwords!  Things like “password”, “abc123”, “qwerty” etc.  When Adobe was hacked, the Stricture group released a list of the most common passwords found from the hack.  Please don’t use any of these!

Really Bad Passwords – these are the top 10 from the Adobe hack:

  • 123456789
  • password
  • adobe123
  • 12345678
  • qwerty
  • 1234567
  • 111111
  • photoshop
  • 123123


Passwords are a necessary evil, so please take a little time to come up with a strategy to keep your data safe that works for you.  You don’t have to have a photographic memory to maintain solid security on your passwords, use a password manager like lastpass or come up with a repeatable scheme and you’ll be fine.  Don’t forget about two factor authentication too – it’s an extra step, but totally worth it.

Add to RSS Feed Add to Technorati Favorites Stumble It! Digg It!

Origin of the word “Scuttlebutt”

2012 May 9
by Andy

Definition of SCUTTLEBUTT


a : a cask on shipboard to contain freshwater for a day’s use
b : a drinking fountain on a ship or at a naval or marine installation
I don’t know why I find this interesting or even mildly amusing, but I do.
This term derives from the butt, or cask, that held drinking water on sailing ships; it was scuttled, or provided with a hole in the top, so that water could be drawn. In the same way that office workers gather around a water cooler to share gossip, the scuttlebutt was the locale of idle talk among mariners. Hence, scuttlebutt came to refer to the gossip itself, and the usage was extended to civilian environments.
Thanks to DWT for this.

Add to RSS Feed Add to Technorati Favorites Stumble It! Digg It!

Happy New Year 2010!!

2010 January 1

Happy New Year all, let’s hope this year is better than last ;)

Add to RSS Feed Add to Technorati Favorites Stumble It! Digg It!

How do I boot into Safe Mode?

2009 December 1
by Andy

If you are fighting a virus/malware on your computer, it is best to boot in safe mode before you start removing things and running scans.  If you don’t, it is likely that the malware will likely just re-install itself.  I’m not going to go into a whole tutorial on virus fighting (maybe in a future post) but the basics are as follows:

1) As soon as you notice you are infected, unplug your internet connection or turn off your wireless.  This will prevent the infection from spreading, and will isolate the offending program from its source.

2) Boot into Safe Mode

3) Run your favorite antivirus/anti-malware program.

This post is really about Safe Mode – how do you get there?  There are a couple of ways depending on the operating system you are using.  Here’s the Microsoft Page on the topic.

Windows XP

If XP is the only operating system installed on your computer, boot into Safe Mode with these instructions.

  • If the computer is running, shut down Windows, and then turn off the power
  • Wait 30 seconds, and then turn the computer on.
  • Start tapping the F8 key. The Windows Advanced Options Menu appears. If you begin tapping the F8 key too soon, some computers display a “keyboard error” message.  If this happens, resstart the computer and try again.
  • Ensure that the Safe mode option is selected.  If you are trying to clean a machine that is virus laden, choose Safe Mode Without Networking.
  • Press Enter. The computer then begins to start in Safe mode.
  • When you are finished with all troubleshooting, close all programs and restart the computer as you normally would.

If you don’t want to bother with function keys, you can use the System Configuration Utility method.

  • Close all open programs.
  • Click Start, Run and type MSCONFIG in the box and click OK
  • The System Configuration Utility appears, On the BOOT.INI tab, Check the “/SAFEBOOT” option, and then click OK and Restart your computer when prompted.
  • The computer restarts in Safe mode.
  • Perform the troubleshooting steps for which you are using Safe Mode.
  • When you are finished with troubleshooting in Safe mode, open MSCONFIG again, on the BOOT.INI tab,  uncheck “/SAFEBOOT” and click OK to restart your computer.  THIS STEP IS CRITICAL.  If you don’t change this back, then the computer will continue to boot in Safe Mode until you do.

Windows 7

Safe Mode in Windows 7 is basically the same as XP – use F8 to get to the Safe Mode startup screen.  MSCONFIG is slightly different – Safe Mode is called Safe Boot, but otherwise the process is the same.

Add to RSS Feed Add to Technorati Favorites Stumble It! Digg It!

10 Facebook Privacy Settings You NEED to Know.

2009 September 2
by Andy

I will summarize here, but the full article by Nick O’Neill from is a great read, and something I wish I had written.  Facebook is a great tool, but in a world where information and identity theft is rampant, you need to know how to protect yourself from, well, yourself.

1) Use Friends lists to group your friends into logical groups.  This allows you to grant different access rights to different groups of people.

2) Remove yourself from Facebook search results.  Like the author, my family is chock full of teachers.  For the most part, they don’t want their students to randomly find their personal information from a Facebook search, but still want to be on Facebook for family and friends.  The solution?  Remove yourself from Facebook search results.  You do this from the “search privacy settings” page.

3) Remove your Facebook self from Google search results.  As you know if you Google yourself (doesn’t everyone do this?) your Facebook profile will come up pretty quickly.  You can remove yourself from Google searches from the “search privacy settings” page – uncheck the “Create a Public Search Listing for me …” check box.

4) Control who sees your tagged photos – You can do this from your profile privacy page.  The cool thing is if you’ve set up your friends groups right, you can allow access to tagged photos by group.  That way the photo of you that you don’t want your boss to see won’t get you fired.

5) Control who sees your photo albums – as with tagged photos, not all pictures are for all eyes.  Check out the Photo Privacy Page.  From there you can control who sees what.  Very handy.

6) Control how your relationship status is displayed in news feeds.  Everyone likes to tout their relationship, but do you really want everyone (boss, business contacts) to know?  Uncheck the “Change relationship status” box on the News Feed and Wall section of your Privacy settings.  This will prevent people from seeing changed to your relationship status in their news feeds.

7) Be sure that applications don’t publish embarrassing news feed posts.  Many applications you sign up for post items to your news feed that are potentially embarrassing.  Be sure that you scan your profile every time you install an application, or better yet, avoid applications completely.

8) Control who sees your contact information.  If you use Facebook for business and for personal contacts, you can control who sees what contact information from you using your Friends Groups.  You can add multiple email address and phone contact items, then edit the custom privacy settings for each to control who sees them.

9) Avoid embarrassing wall posts.   Facebook lets you control not only who posts to your wall, but also who can see those posts.  In the Profile section you can change who posts to your wall by choosing “custom” from the “Wall Posts” drop down.  From there you can use your Friends groups to control who posts and who sees what.

10) Like your hands, keep your friends to yourself.  I love seeing who is friends with my friends, but some people don’t want to share, and in some cases, it’s probably not a good idea to share.  Once again, you can customize who can see your friends list using your friends groups.

There are endless ways to control your privacy on Facebook, but you need to take the time to sort through the settings.  Friends Grouping is a great place to start and ensures that you have separation of your business and personal contacts.  Get to know your privacy settings!!

Add to RSS Feed Add to Technorati Favorites Stumble It! Digg It!


2009 August 20
tags: , ,
by Andy

Another question I get asked a lot is on Wireless security.  People get very confused by the security options out there, and the industry doesn’t help by adding acronym after acronym.  So what do you do?  The answer is fairly simple – secure your network with WPA!!

There are lots of methods to use to secure your wireless network.  The most common is WEP, but that is being replaced by the newer (and better) WPA protocol.  You can also secure the network by allowing only specific computers on the network.  This is simple to do, and doesn’t require security keys and messy settings.  The problem with it is that the data you send wirelessly is not encrypted.  With WEP and WPA, the data is encrypted.

What are these things anyway?

WEP or Wired Equivalent Privacy (see the Wiki for more info) is an encryption protocol developed in the late 1990’s to secure wireless networks.  It offers 64bit and 128 bit encryption using a key generated by a passphrase you enter, but is easily cracked.  Despite this, there are a ton of people who still use WEP since it is the default protection on many routers.

WPA (WiFi Protected Access) is the next generation encryption algorithm that replaced WEP.  WPA uses 256bit encryption keys, and is far more secure than WEP.  It’s not the be-all-end-all, but is very good.  As with WEP, you have the option of generating a security key using a passphrase so that you don’t have to remember a string of random hex digits.  This is great, BUT you have to be careful about the passphrase you use.  DON’T use things like your pets name, your kid’s name, your street, or anything that can be guessed.

The clear answer is to secure your network with WPA.

BUT – do you have to secure your network at all?  The safe answer is yes.

What happens if you don’t secure your network?  That depends on where you live, how close your neighbors are, and how you secure your computers.  Most wireless routers have a range of 150 feet.  That means that if your neighbors are more than 150 feet away, they will not be able to get on your network unless they are standing outside your house with their laptop.

If you don’t change the default security settings on your computers, chances are that even if someone did get on your network, they wouldn’t be able to do much.  By default settings I mean:

  • No shared hard drive locations
  • Remote control disabled
  • Firewalls up and running on every computer
  • Anti-Virus up and running on every computer

Of course, this is not always realistic – I have lots of shared directories, and remote control enabled on my machines because I like to be able to work on any machine from anywhere if I need to.  For that reason, I like to secure the network so that if someone manages to get on they won’t get to my personal files.

The bottom line on security for wireless networks is best practice is to secure your network using WPA.  That said, if you live in a remote area where no one will likely be in range of your wireless, it’s not really necessary, just a good idea.

Add to RSS Feed Add to Technorati Favorites Stumble It! Digg It!

Twitter is mostly useless drivel

2009 August 17
by Andy

A couple of recent studies on Twitter and people who tweet point out that over 40% of all tweets fall into the category of “pointless babble”.  Pear Analytics put out a report with these and other interesting findings.  I’m sure it comes as no surprise that 75% of all tweets come from just 5% of people who tweet. 

Sysomos also does research into twitter usage and in their blog report  that 24% of all tweets are bots and other programatic postings.  Not surprising since the top contributors are posting 150 tweets and more a day.  Interestingly, they also put together a list of the top posters who have 5000 or more followers, and less than 50 posts per day.  The assumption is that these are reall posters, not bots.  Chris Brogan tops that list.  Who is he?  He’s a guy that helps businesses use social media.  Practice what you preach I guess.

Lots of other interesting facts.  55% of tweeters are women, 78% are caucasian.  The number of African American twitter users is well above the average for African American internet users.  I have no idea what that says about African American internet users, but there it is. The demographic information on Twitter is from quantcast.  A very cool stat site for websites.


So what does this all mean?  Be careful who you follow, and don’t feel bad about dropping the people who post too much – they are likely just a bot anyway.

Add to RSS Feed Add to Technorati Favorites Stumble It! Digg It!

35 best iPhone apps of the year so far

2009 August 16
by Andy

AppVee ( has released their list of the 35 best iPhone apps of the year so far. If you don’t know about AppVee, they are awesome. Basically, they look at every (well almost every, they do ignore the nonsense) iPhone app published and winow out the good from bad. They seemingly impossibly review more apps that I thought possible, and they do a really good job.

The list of apps they like so far is here.

Notable inclusions are TweetDeck, Skype and Kindle – three of my personal favs.

Thanks AppVee!!

Add to RSS Feed Add to Technorati Favorites Stumble It! Digg It!

Outlook 2007 tips

2009 August 13
by Andy

While I’m on the subject of tips, here are a few tips for Outlook 2007.

1) Stop Outlook from suggesting names in the TO field.

This is related to the .nk2 file I blogged about awhile ago.  If you don’t like that outlook suggests names for you, then you can turn this off.  Go to Tools, then Options.  From there choose the Preferences tab, then click the e-mail options button.  In the e-mail options dialog, click the Advanced E-mail Options button.  Uncheck the radio button for “Suggest names while completing To, Cc, and Bcc fields”.  Click “ok”.

2) Configure Outlook to NEVER send read receipts.

Personally, I think read receipts are annoying.  Some people love them, and who am I to judge, but I’d prefer to keep when I read your mail to myself, so I turn this “feature” off.  To do this, go to Tools, then Options.  From there choose the Preferences tab, then click the E-mail options button.  In the E-mail options window, choose the “Tracking Options” button.  Look for “Use this option to decide how to respond to requests for read receipts. Only applies to Internet Mail accounts.”   There are a couple of radio buttons – choose “never send a response”.  Click “ok”.

3) Remove the System Tray icon for new email

Another love it or hate it item.  I like this one, but when the system tray gets cluttered, out it goes.  To remove the icon, once again go to Tools, Options and from there choos the Preferences tab.  On the Preferences tab choose the E-mail Options button.  In the E-mail options dialog choose the Advanced E-mail Options button.  Under the “When new items arrive in My Inbox”, uncheck “Show an envelope icon in the notification area”.  Click “ok”.

4) Configure Outlook to empty the deleted items folder when you exit.

This is really helpful if you have limited mailbox space.  Deleted items count toward your mailbox space limits, so you either need to remember to empty your deleted items, or have outlook do it for you when you exit the application.

To configure Outlook to empty deleted items on exit, go to Tools, the Options, then choose the “Other” tab.  Under “General”, check “Empty the Deleted Items folder upon exiting”.  Click “ok”.  Your sysadmin will love you ;)

5) Add Holidays to your Calendar

Outlook support iCal, so there are thousands of calendars you can add to Outlook.  To add holidays from the default list, go to Tools then Options, then choose the Preferences tab.  In the Calendar section, click the Calendar Options button.  In the Calendar Options window, click the “Add Holidays” button.  Scroll through the resulting list, click the radio button next to the ones you want, then click “ok”.

Just a few things for now.  I’ll add more another time.

Add to RSS Feed Add to Technorati Favorites Stumble It! Digg It!