Tuesday, December 27, 2011

The death of iWeb ?

I read an article today that made me a little sad, it pointed out that mobile me was going to be terminated June 30 2012. I knew that this was going to happen, when I first heard it , that date was so far off, now it is growing closer and if you have a website published with iWeb, now is the time to start thinking about moving your site to another web host. With this information comes the other question what is going to happen to IWeb, well hopefully apple has something up their sleeve, otherwise start learning another program, most of the features you know and love are going to be made useless. Leave your comments below. And as always, till next time, keep it real.

Post holiday, as the dust settles

Christmas had come and gone, the gifts are opened and now we start the year long task of paying off the credit cards that got maxed out. iPods, laptops, headphones, and a list of other things too large to list now have new homes. Out of all these things, as cool as they are, what is the thing that everyone wants? It's very simple yet so many people still don't get the meaning of. Figured out what it is yet? The one thing that people really want is access, plain and simple. The ability to live our digital lives has almost become as vital as breathing , or eating. Let me pose a challenge, turn your smartphone or laptop off for a day, or better still, 5 hours. Kind of feels like someone is smothering you , I admit it even I'm guilty of it. Think it's bad now, wait like 4or 5 years. What did you get for Christmas and how much of your holiday did you post to Facebook the minute it happened? Leave your comments below, or shoot me an email-hdemarzo@gmail.com. Until next time, keep it real!

Monday, December 19, 2011

AT&T--Tmobile merger officially dead

It appears that the merger between two of the big four mobile providers has been put up against the firing line.  For anyone who was looking forward to this merger will have to wait for better service in some areas.  This is a real bummer because i was really looking forward to the merger, the cell service in my area really sux.  This would have been a very needed improvement.  But for now i will have to deal with it.  How about any of you, would this merger really have been a plus for you or simply just another reason for your mobile bill to go up??   leave your comments below.  Also be sure to check out my new hub at  www.about.me/hdemarzo

Sunday, December 18, 2011

Mornings and the tech we use.

As I was getting ready for work at the ungodly hour of 5:30 am I was wondering to myself, I wonder what other people's morning routines are. Not just what you have for breakfast, but what you do while you are having your coffee or juice with that bowl of cereal, or an omlet. Do you wake your computer for sleep mode and go right to the email, hit the slider in your iPad or iPhone and update your Facebook status. Everyone has a different routine, what is yours? Let me know below or hit my page @ about.me/hdemarzo to connect with me in one of the many ways I have available for you to share your thoughts. Until next time, keep it real!

Friday, December 16, 2011

Technology misappropriation

Everyday I see kids, and I do mean kids, with expensive phones. Middle school kids with iPhones, blackberries, and android devices walking around like they are 30. I not saying that I'm against kids that age shouldn't have ad use technology, I'm just saying that they don't need an iPhone when they are I 5th grade. A go phone, or a small candy bar phone is perfect. They loose them, leave them places, and don't care, except for the fact that they are going to get yelled at. Smartphones require responsibility, learn it before you get a super expensive mobile device. I mean remember your school books and homework before anything, not password to your Facebook. Leave a comment or send me an email (hdemarzo@gmail.com). Till next time, keep it real !

Thursday, December 15, 2011

iPhone desktop dock (build in progress)

About a week ago we posted a video on the Tech cruiser YouTube Chanel about a dashboard mount for your iPhone. Having been using it since then I found a few new ways to tweak it for greater stability while shooting video. For example, instead of using silicone to achieve greater adhesion to the dashboard, and locating a better attachment for the iPhone to rest in. These additions came during the start of my newest project. A desktop dock for my iPhone. I tried to keep the cost of the project to almost nothing by using items that I had around the house, a sync cable, some silicone, and the packaging for my magic mouse. I got the build about 80% of the way to completion when I realized that the silicone was beginning to separate from the surface of the plastic. So I thought what is better than silicone for this? Duh, two part epoxy, something like jb weld should do the trick. I was planning on painting it any way, that's where I am at now waiting on the trip to the store to get some epoxy to finish the project. Just Incase you were wondering, no the buckyballs are not part. Of the project, they are damn cool though. Until next time, keep it real!

Saturday, November 5, 2011

Apple IOS 5





Recently there has been lots of stuff coming out of Cupertino regarding a few bugs that have been plaguing users of the new IPhone 4s and IOS 5. According to many users, there is a serious flaw with the battery and how long it lasts. Apple released a statement saying that they are aware of a bug that is causing the issue and have a plan in place to fix the issue. A second beta of IOS 5.0.1 has been released, and Apple says that it will release the update in a few weeks to fix the problem. Is this something that you expected or is this a surprise to the FAN-BOY world of apple. As an apple man, I can say that I expected the new IOS to have problems. As a general rule I never run out and grab the newest in Apples lineup until it is necessary for me to upgrade, or at least I wait for a couple of months. This way I am ensured that at least the biggest problems are worked out of any device. Do you follow the same rule or do you run out and grab the newest and greatest right away??






Saturday, October 29, 2011

Laptops and the future...

For al of us that follow the tech industry, read the blogs, and watch the live streams of the release events, we hear the phrase "The future of computing" very often.  But what does that mean for us, in the trenches swiping and tapping on our ipads, opening our laotops i nthe coffee shops and diners?  Do you see yourself ditching you laptop for an ipad or just a smart phone?  For those that do video editing, or image manipulation, or data crunching the answer is definately no( at least for me) there is absolutely no way that I could function with only an ipad and a smart phone.  Could I use an iphone instead of a webcam and my laptop on the car seat to film in the car, yes, but I still need my Macbook Pro to edit it.  The future image you see in the movies is still a long way out.  So for those that dream of a Star Trek type of everyday computing life style, sorry you will have to wait, maybe a LONG time.


Powered by Qumana


Tuesday, October 18, 2011

Switch to the dark side


Swiftly approaching the 1 year mark of officially making the switch to MAC and the list of apps that i can't live without has grown a little…well ok it has grown a lot. 

 Previously i mentioned 7ZIP. Good program, I found a better one, on that i use at least two or three times a day.

It is called Unarchiver http://wakaba.c3.cx/s/apps/unarchiver this app integrates seamlessly into OS X. When you click in a compressed archive, the unarchiver takes over automatically and does the hard work for you. Zip, Tar-GZip, Tar-BZip2, RAR, 7-zip, LhA, StuffIt and many other old and obscure formats. There is a complete listing of the formats at the link above. 



Another great app that has quickly found its way into my heart, not to mention a firm planting onto my dock, APPZAPPER has been one of the most instrumental apps in keeping my compy clean and fresh. Fire up the app and drop what you want deleted onto the window, click zap and all the associated files for that item are sent to the trash bin. then just empty the trash. Easy as that!! Nuff said, here is the link for more information http://appzapper.com/ Stay tuned for more great apps and "STUFF" to make life on a mac AWESOME!!




Powered by Qumana

Monday, October 17, 2011

A week with OS X Lion.....Roomates or annoying friend??

Ok folks, its been about a week since I upgraded to Apple's new OS, and I think that i'm ready to share my feelings about the Big fuzzy kitty that now rules my laptop. 

There are a ton of new features, 250 of them to be exact. Most of them you don't see or know about.  But the ones that you do notice, have so far been pretty darn cool.  Like for example, spaces.  Who knew that the multiple desktops would be as useful as they are.  Granted,  Linux has been using this feature for years, but somehow Apple does it with a little panache.  It come in handy when you are filling out a job application for example.  You have the Application on one space, on another you have your resume, another one has you email, and the last one has Itunes.  Wait you need more than that?   No worries, just pop open the dashboard and throw another one in there and you're good to go.  A_MA_ZING!

How about the Shiny new finish and polish that they put into Lion.  Instead of being more round and bubbly that squared off the corners, made the buttons a little smaller, even the progress bars got a little more geometric.  Not what we have all come to know and love but, never the less, gives OS X a feel of maturity.

The biggest change (And in my opinion the best change apple made since touch screens)  Shows itself in the COMPLETELY revamped version of mail.  When they were designing the changes for this OS they put a great deal into mail, it is cleaner, easier to use and the use of full screen apps that Apple has sprinkled into every corner of Lion, makes mail My number one pick For the best updates in Lion.

There are a ton of new Features to talk about, so stay tuned for the next Round of updates.  Until next time,   keep it real!!

Wednesday, July 20, 2011

Monday, June 20, 2011

Indiana Jones....And LIfe ??

I have been watching the Indiana Jones movies from the first one, I just finished the Last Crusade.  Upon ending credits, I am left wondering if they are just movies or can  they be applied to life?  The biggest message that is expressed in this movie is inner discovery and the search for truth within yourself.  At one point in the movie, Harrison Ford is hanging on by a finger nail at the edge of a seemingly bottomless crevice, just barely out of reach of the HOLY GRAIL,  His father says " Indiana, let it go".  DO you think that this could be applied to real life?  Could the biggest thing in your life, the single most important discovery really be within yourself?? Leave your comments and spread the word about this blog, we talk about some good topics here.  Or at least we will when I get a bigger audience!!!

Sunday, May 29, 2011

Apple needs to learn from Microsoft?

I just read an article about what Apple needs to learn from Microsoft.  It almost made my head snap around.  If i remember my computer history correctly Apple computer had a working GUI a full year before Microsoft did.  The number of viruses for Windows is a mind blowing number when compared to the number of viruses for MAC.  Many people have been under the impression that MAC'S  "Don't get viruses"  This could not be further from the truth.  Any computer system can be infected with a virus.  There is one main factor that contributes to the number of viruses that it gets, this is how many machines are in use.  The vast number of businesses use windows machines as the primary backbone of their computer networks.  This presents itself as a humongous flag that says "ATTACK ME".  The bigger the nail, the quicker it gets "Hammered".  For today this is all that I have about this topic.  More to come in the days to come about MAC and PC.  For now, Keep it real.

Tuesday, May 24, 2011

AOL ->Bad tech support->Version number confusion

ImagesUnless you have been living under a massive rock, you probably noticed the newest advances in technology, either in your daily checklist of tech blogs and sites that get checked on a daily basis. With these advances comes new and better ways to get to the information that we crave on a daily basis. For those of you that don't know AOL is still in business and offering consumers "The newest and best of the internet and email". This is the biggest load of crap i have ever heard. I was providing tech support for members of my family today, ya know being the good guy that I am, among the issues to be looked at was with the AOL desktop software. Simply put, emails were going right into the drafts folder. So your first thought would be that the server settings somehow got tweaked. That was my first thought. When I started digging i found that the server settings were correct. Now, having very little experience with the AOL desktop software i decided to get some assistance. So I fired up Skype and placed a call to AOL. Images  1 WHen I got the tech support on the line. By the way, the automated menu that AOL has was actually VERY easy to navigate, anyway. I started talking to the tech support "SPECIALIST" HAHA the only thing that he was specialized was reading the instruction from the PDF "How to". Like "OK...Now click the little blue button on the left side that says" click-click-boom!!! It really made me want to kick something. So after talking with the chap for a while and painfully running thru the instructions, he learned that i was using version 10.1 of the software. Now this is where my other gripe comes in. WHen EVERY other software company releases software, their version number goes up. ya know OSX 10.4/10.5/10.6 or anything else. Not the case with AOL, they go down. I was informed that i needed the newest version 9.6. WAIT WHAT?? the newest version has a lower version number? In what universe does that make sense? And here is the icing on the cake, as the "NEWEST" version was being installed, i told him that it was installing, and he HUNG UP ON ME!!! So here it is people GET RID OF AOL!!!!!

Friday, May 13, 2011

Microsoft Buys Skype

So Microsoft jsut recently bought Skype for a cash value amount of of 8 Billion dollars.  Many of you would be wondering why would Microsoft bother with buying Skype?  There are a few VERY good reasons why.  First, the user base is mind boggling. 683 million in Q4 of 2009 and it has only gotten larger since then.  Another big selling point for Microsoft was the accessability to Facebook.  It will allow Microsoft to place even more ads on Facebook, as well as within the actual Skype application.  For many MAC users that use Skype, this merge means that microsoft will have even more access to our cloud of OS X.  I have seen Microsoft compared to SKYNET.  So who knows what the future holds for Skype and MAC in the near future.  Let me know what you think....



Tuesday, February 1, 2011

The Security Attacks Most People Have Never Heard Of

The Security Attacks Most People Have Never Heard Of

Smishing: Smishing or "SMS phishing" refers to a phishing attack that specifically targets mobile phones. The victim would receive an SMS with a hyperlink wherein a malware automatically finds its way in your phone or leads the user to a phishing site formatted for mobile screens. The term was brought on by David Rayhawk in a McAfee Avert Labs blog.
Botnet (Zombie PCs): A portmanteau of the words "Robot" and "Network," a Botnet is any number of internet computers that inconspicuous to their owners; forward e-mails (any of which include spam, malware, or viruses) to other computers on the internet. These infected computers are also known as "zombies". DoS attacks (Denial of Service) often rely on thousands of zombie PCs.
BlueBugging: A craze originally jumpstarted by a Malaysian IT Professional, bluebugging (not to be confused with bluesnarfing) allows a more skilled person to illegally access a cellular phone via Bluetooth wireless technology. This act often times goes unnoticed without any proper notification or alerting to the phone's user. A vulnerability such as this allows phone calls, SMS messages to be read and sent, phonebook contacts to be erased, phone conversations to be tapped, and other malicious activities. But much to the hacker's dismay [I think the hacker knows the limitations… perhaps the point is that widespread impact is minimized because of the range…], access is only attainable within a 10 meter range of the phone.
Pod Slurping: Coined by US security expert Abe Usher; Pod Slurping is when your iPod or any portable USB storage device begins to surreptitiously copy large amounts of files from your computer to its hard drive, it's engaged in something called "Pod Slurping". Pod slurping is becoming an increasing security risk to companies and government agencies. Typically, access is gained while the computer is unattended, and this process can occur in as little as 65 seconds.
Ransomware: A program that makes a computer near unusable then demands payment in order for the user to regain full access. It "kidnaps" the computer! Ransomware is also commonly referred to as a "cryptovirus" or "cryptotrojan." Examples of Ransomware include Gpcode.AK, Krotten, and Archiveus. Ransomware was originally a with a trojan called PC Cyborg, created by a Dr. Joseph Popp.
Scareware: Scareware is software that tricks people into downloading or purchasing it, under the guise of fixing their computer, when in reality the faux anti-virus program is the real problem. Scareware programs often run a fictitious or careless system scan, and then present the user with a list of malicious programs that must be corrected, always leaving itself off of the list. The scareware then informs that in order to fix these "problems" it will require the user to pay a fee for a "full" or "registered" version of the software. Examples of scareware include: System Security, Anti-Virus 2010, and Registry Cleaner XP.
Sidejacking: Sidejacking is a hacking technique used to gain access to your website specific accounts. Websites typically encrypt your password so it cannot be stolen, but then send you an unencrypted "session-id". The session-id is either some random data in the URL, or more often, random data in a HTTP cookie. A hacker who finds the session-id can then use it to gain access to the respective account. Thus enabling the hacker ability to read your email, look at what you've bought online, or control your social network account, and so on. Robert Graham, who pulled together a variety of known and new vulnerabilities and packaged them into an automated session snatcher, was responsible for this term.
Black Hat: "Black Hat" hackers are those people who specialize in unauthorized breaching of information systems, often times attacking those containing sensitive information. They may use computers to attack systems for profit, for fun, or for political motivations. Attacks often involve modification and/or destruction of data which is done without authorization. They also may distribute computer viruses, internet Worms and deliver spam through the use of botnets.
White Hat: A "White Hat" hacker describes an individual who identifies a security weakness in a computer system or network but, instead of maliciously taking advantage of it, exposes the weakness, and repairs the vulnerability protecting the network from unwarranted intrusions or attacks. The term is taken from old western films, where the white hat cowboy is portrayed as the hero, and the black hat as the villain.

The Attacks Everyone Sort of Understands

Worm: Originating in a Xerox Palo Alto Research Center 1979 by engineers, a "Computer Worm" was originally designed to make programs run more efficiently, then later corrupted to be a destructive computer virus that can alter or erase data on computers. Often times, they leave files irretrievably corrupted or slow the PC down to a crawl.
Trojan Horse: A long time and common infection found amongst even the newest of computers, this destructive program disguises itself as a harmless application. Although Trojans are incapable of self-replication, they are still just as destructive as a computer virus. In an act similar to its Greek origin, often times a Trojan horse opens up a backdoor to your computer enabling potential viral infections and allowing hackers to control the PC. Origins trace back to MIT hacker turned NSA spook, Dan Edwards.
Phishing: Originated by hackers who were stealing America On Line accounts by scamming passwords from unsuspecting users, "phishing" is the age-old crime of taking ownership of sensitive information from third parties (phishing scam victims). Information includes usernames, passwords, banking information, and credit card numbers. This is typically accomplished from sending someone an e-mail fraudulently claiming to be a legitimate company, or redirecting someone to a website that looks legitimate but isn't. More often than not, the direct result of being phished is your identity being stolen.
Script Kiddies: A term originated by Marcus Ranum to describe white hats who had no idea what they were doing, a script kiddy (sometimes plural as kiddies) is a derogative term, used by more skilled hackers of computer security systems, to describe young or less experienced hackers who still can be just as much a threat or annoyance. Utilizing cheap techniques, pre-written scripts and sometimes with assistance, the average script kiddy can exploit a weakness with computer networks. The difference is that these untrained hackers are often unaware of the potential consequences of their actions.
Keylogging: Originally designed by Perry Kivolowitz for a Usenet news group in 1983, Keylogging for the most part has become increasingly common, not to mention dangerous. It involves the recording of any keyboard input via internet connection. Not every instance of keylogging is necessarily illegal. It's sometimes done as a way to monitor teens and children.
Social Engineering: Brought into common knowledge by Kevin Mitnick (a hacker popular back in the day), Social Engineering involves obtaining or attempting to obtain private data by illegally persuading an individual to reveal otherwise secure information. The Information released by victims is often then used to attack a computer network. One common example would be when an employee at a large company is convinced to give out his employee identification, and then it is manipulated to gain further access to the said company's network, often sensitive information.
Crapware: Originally coined and reported by Marc Orchant on his ZDNet blog, Crapware is comprised of programs that use valuable resources on a computer's hard drive, such as memory or RAM, which are not necessary and are unused by the computer owner. Crapware can range from software loaded onto the system prior to sale to programs that are downloaded from the internet without the knowledge or consent of the user. One of the more common examples of Crapware is AOL being installed on PCs by the PC manufacturer.
Got a favorite we did or didn't mention—or a term you've made up yourself? Let's hear it in the comments.

Sunday, January 16, 2011

Issues with Ubuntu….but still love it.

Ok so after a long stint of using ONLY Ubuntu Linux I can honestly say that I love it but it still has a bit to go before it can honestly over take Windows for the title of “Primary OS’.  Now I didn’t just run it on a virtual machine for an hour.  I ran it as my main OS for over six months.  During this time, I have compiled a list of points both good and bad.

First and foremost is the factor that Linux(depending on which distribution you use) requires a lot of setup of components, ie: sound card, dvd playback, and audio playback.  Though with a little patience, and some help from the forums. 

The next thing that I noticed is that the flash plugin did not perform as it did on Windows, considering that Windows is a paid software, this is to be expected.  However while navigating various sites I found it to be choppy.  The games on facebook were very choppy also.

On the other side of the coin, All of the software is completely free.  The whole operating system is much faster than Windows.  I would say that it is about 30-40% faster.  It feels much more confortable to work around in.  For now that is all I have for you guys.  Im going to keep  writing about this, and keep you updated in the future.

Tuesday, January 11, 2011

Iphone on verizon!!!!!!

So the Iphone is going to verizon. Are you going to switch to verizon or stay with AT&T? There are questions about how the Iphone is going to be able handle the LTE network? There are also questions about the life cycle of the Iphone on AT&T vs on Verizon. What are you going to do, switch now or wait until june when the Iphone 5 is expected to be released?