eXtra Notes

Blue Apple

Graham K. Rogers


Unpublished ideas that are not going to make it into print

Previous note (1) can be found here.
Previous note (2) can be found here.
Previous note (3) can be found here.
Previous note (4) can be found here.
Previous note (5) can be found here.
Previous note (6) can be found here.
Previous note (7) can be found here.
Previous note (8) can be found here.


Phuket Mac User Group

A slight difference for this xnote as I am going to cover a meeting I attended last night (24 Nov 2004) of the paradise Mac Users' Group, down in Phuket. I was a guest of Sam-Erik Ruttman, manager of the Dusit Laguna Hotel. The meeting was actually held at The Phuket Boat Lagoon Resort Hotel who had laid on a projector and screen, and was helped by a fair turnout as well as the assistance of Ekawat Chansamutwathana and his team from Phuket's Alpha Engineering, who brought along a dual 1.8GHz G5 for me to play with. As I had also carried down the Wacom Intuos 3 graphics tablet along with my Nikon D70, we were able to cover a wide range of subjects during the evening: details, as best I can remember them follow.

After a brief introduction by Sam, I thanked him, Ekawat and also John Williams (of Siam Dive 'n Sail) who has been a long-time correspondent: we have solved many problems online.

iPhoto
I decided to start with the camera and plugged in the USB connector causing iPhoto to start up. As it was the first time -- a new machine -- I had to go through a couple of screens and was then ready to import. With iPhoto the camera is automatically recognised, and there are no driver problems. It is a lousy editor of pictures, but I think it is a useful organiser. Importing took a couple of minutes as there were plenty of images and they were large. Using "export" I showed how one image (or several) could be retrieved and used. I showed all of the images using the "edit" function and several of the members expressed surprise at the size we were able to enlarge the pictures on the screen. This was not a feature of iPhoto but was due to the quality that the Nikon produces. I used another function of "export" and showed how to create a "quick and dirty" web-page of thumbnails and images. The images themselves were in the region of 200Kb and so considerably smaller than the 2.8MB originals. We also viewed the source file in Safari and saw how the simple html page produced could be easily edited to improve things.

During the 24 hours that I was in the Pearl of the Andaman, I took a number of photographs. I made a web page using the same method I outlined at the meeting: all the pictures used here are undoctored.

I also pointed out that the "book" function of iPhoto ought not to be forgotten. Although Apple has not brought the book-making function to Thailand, in much the same way as we are unable to buy from the iTunes shop, it is still possible to create a book and print it out on quality paper ourselves, or save it as a pdf.


iPod
Putting in the iPod will usually start up iTunes and, if this is not your usual computer, resist the temptation to press the "return" key when a dialogue box appears. You are being offered the chance to make this computer your iPod computer. In the case of Alpha's G5, with nothing in iTunes, I would have removed all the music in my iPod. Of course, I would have been able to synchronise pnce back in Bangkok, but it was easier to just say, No. Once in iTines, selecting the iPod icon, gives you access to its preferences and it is here that you can turn on "disk use". With it operating as a hard disk, not only can it be used to transfer and store files, but it can be made bootable. I have done this and put on rescue software, including Disk Warrior, but I do not suggest that it is used as a regular hard disk" emergency only for me.

With the iPod plugged into the Firewire port, I put in the Panther startup disks: this will not work with the computers original install disks. Restart using the "C" key and when the installer comes up, select the iPod as the target. It is of useful if the installation is customized and most applications are removed, languages deselected and no extras are put in. I put on only the BSD subsystem and Stuffit Expander. That brings it down to a little over 1GB.


Wacom Intuos 3
As the computer arrived early, I was able to take 5 minutes - which is all it takes -- to install the software for the Intuos graphics tablet. Although I would not profess to any expertise with this technology, it is obviously easier to draw with this than with a mouse. I was able to demonstrate the adding of an application to the Wacom preferences. This allows each application used to have its own settings, if a user so desires.


Random Access Memory (RAM)
While we were discussing aspects of the operations, I interrupted a question about RAM and said, that, in my opinion, you can never have enough. The question really being asked was on how SX differes in its handling of memory allocation. With earlier systems, each program had its own allocation (which could be altered by use of "Get Information") and when an application was shut down, in theory, the memory would be returned to the system. OSX allocates and reallocates as necessary. To demonstrate this, I opened the Applications folder and selected All, then pressed "Open". One by one the folders then the applcations opened. As there were quite a few on the hard disk, this took quite a while, especially as some were being opened for the first time and might require registration or other information.

applications folder
With OS9, or with other operating systems, this would have brought everything to a halt; but OSX copes well with this. At the end, rather than go through the laboriousness of shutting down every application, I pressed the Shift + Option + Command + Q keys and was loged out.


Security
As this is something I am concerned about right now, I looked at a number of ways that security can affect users:

  • Cleaning up after visiting sites. Occasionally, one of us might visit a website that has information or images that we would be better off not showing the children. I am not advocating censorship but some are a little too easy to come across nowadays. A little cleaning up is called for here. I start with the caches and empty these. I also have a close look at the cookies. These are useful sometimes, For example I am able to view sites like the New York Times without the need to enter a password each visit; but the cookies may well send back information and you could find yourself on the receiving end of email offers you do not need. A selective cull of cookies is called for.

  • Phishing. More and more people are sent emails that are simply scams that try to glean information that could later be used in illegal ways. I had one a few weeks ago that purported to be from Citibank with a genuine-looking Citibank URL to click on. It annoyed me in that it included an implied threat to my credit should I not comply with the request. Citibank confirmed that this was indeed not genuine and asked for the mail headers so that they could take steps to shut the site down.

    This week, I had an almost identical message that told me it was from "Sun Trust Banks". I had never heard of this group, so thought it was highly unlikely they would be contacting me. Like the earlier Citibank scam message, this made the threat "This process is mandatory, and if not completed within the nearest time your account or credit card may be subject to temporary suspension". Apart from grammar weaknesses, the lack of a defined time limit makes this highly questionable anyway. In the centre of the message is a link to a web site. Although the Sun Trust Bank does have a website, that particular URL does not exist but if you were to click on it, you would not link to Sun Trust anyway.

    The entire message is a GIF. Click on it and you can drag it to the desktop. Beneath it is some useful information that you can look at in Mail using View>Message>Raw Source. What you see is that the message is a mapped image, with some randown text underneath. The nasty bit is in the middle where the coordinates of the URL send you to another which is coded in hexadecimal. I have removed the last part of the information after the colon:

    http://%31%39%35%2E%31%34%36%2E%39%39%2E%31%38%30:

    It is a web address, but not an alphabetic URL. If you look closely, the code, 2E appears regularly and I realised this was an IP number. I tracked this down using valuable information provided at the University of Texas at Arlington by Michael Doran a systems librarian. As I surmised 2E is a period. Those numbers, separated by the % sign translate to 195.146.99.180 and to find out where this is, I used "WHOIS" in Network Utilty. It comes up as a site in the Czech Republic run by Tiscali. There is no suggestion that Tiscali are involved, but one of their users is. I sent the information to Sun Trust but, unlike Citibank, they did not deign to reply.The latest version of this is a job offer scam: potential victoms are asked to send personal details via a link to a reputable company that (again) is in no way involved. Keep your cards close to your chest.

  • Firewalls. OSX has a firewall and users should have it on. The firewall, however, stops incoming but not outgoing. If you are not careful, alll manner of information can be sent to companies and others from your computer while you are online. Some of this information does have to be sent, but some is just data about you that can be used or even sold. A useful utility I have is Little Snitch which will only let connections be made if you authorise them. For example, I allow links by Safari, QuickTime, Fetch (FTP) and those that obviously have to make such links; some of the others I allow once, and some never.

  • Permissions. The item on firwalls, stimulated one member into asking a question about permissions as he was unsure how to make files created on one account available to users on another. By using Get Information in the Finder (or Command + i) a panel appears and there is a section near the bottom that deals with permissions. As in Unix, there are three sets of permissions: the user/owner, the group, and Others. The owner would normally have permission to read and write\; the group to read or read and write, and Others to read, or no access. All of these, as well as owner, can be changed. In Unix, if you were to run ls -l at the command line, you might see something like -rwxrw-rw- or (for a directory) drwxrw-rw- with information shown in groups of three: read, write and execute (see below for other Unix information). Althouguh it is possible to change the permissions, this should only be done if you are really certain of what you want to do. A valid example would be when moving an image from one user's account to another via the "Sharing" folder in Users. The owner of the file received in the second user's account ought to be changed so that the user has full access to it. I came back to the idea of permissions in the section on maintenance, following.

  • Maintenance. If a machine with OSX installed is left on 24/7 then the Unix is told (using Cron files: regular time) to run certain tasks. Among these are daily, weekly and monthly cleanup routinbes of log files and databases. Many were clearly unaware of this. I think that, if the machines are not left on, it is useful to run these either using a utility (MacJanitor, Macaroni amnd OnyX were mentioned) or from the command line. There were almost gasps when I started Terminal but it is useful to be familiar with this; and, anyway, many of the utilities we use are Unix commands with a pretty face. I also put forward the view that, Apple has not done its duty by failing to inform users that running these would be beneficial. At the command line n Terminal, I entered last and got a listing for every log in since the monthly cleanup was last run.

    terminalTerminal will open looking like a white rectangle with some black letters. You can change the colours if you want (I have in this image -- this reminds me of the original monochrome monitors that were almost universal when I first used computers).

    Terminal is the OSX way to use a command line. It sounds odd for the Mac which pioneered the graphical interface, but (believe me) getting used to this has made my life a lot easier. The commands you need to run are really only for the Root user. Root is the owner of the system. Most of the time we do not use Root as it is dangerous. One wrong keystroke and you could lose everything. Being Unix, there is a way round. If we have an administration account we can pretend to be a substitute user by using the sudo command (this allows Root tasks for 5 minutes) and then entering the neceesary text:

    sudo sh /etc/daily

    Hit the Return key. The Terminal will first give a warning, and then it will ask for a password. Enter your password and again press the Return key. Let OSX do its stuff and then you will be back to the prompt.

    As well as the daily command, there are weekly and monthly commands too. Either type in the command in full or press the UP key and then edit the last command, so you end up with

    sudo sh /etc/weekly

    Have faith with this one. It takes a long time: perhaps as long as ten minutes, depending on the size of the hard disk and the speed of the machine. I also regard this one as the most essential of the three cleanup routines as there are noticeable performance increases on a Saturday morning (it normaly runs during the previous night).

    Similarly, the monthly command is

    sudo sh /etc/monthly

    This cleans up the data about the month's logins (useful if you have a few accounts on the machine).

    Along with these maintenance tasks, I think that using Disk Utility to repair permissions is also valuable. I run this at least once a week (with MAcaroni it is done automatically), plus before and after installing software. When repair Permissions is run, it always shows the line "We are using . . . . 33261" which is all quite normal. It may or may not show that specific permissions are being repaired, but at the end, you will see "The privileges have been verified or repaired on the selected volume". This can either be run on the disk or the partition. It is useful to check the disk occasionally particularly for the S.M.A.R.T. status which should show "Verified". If that changes to red and has something other than "verified" back up your data (you should be doing this anyway) and save up for a new disk.

  • An afterthought. I notice that many users do not login (up to you of course) and that some use a blank as a password: just hit "enter". This is risky and a pasword is the start of your protection. Some commentators are now suggesting that it may be better to have an Admn user (you must have this of course) but to do day to day working in a user account. I do have this at my office, but that is not my own machine; but I am seriously considering this for my own computing.


    Startup keys. I restarted the G5 in single user mode (Command + S) to bring up the raw Unix and show he members what happens underneath the startup procedure. At the Root level prompt, it is possible to run a similar disk check to that run by Disk Utility. The command is fsck -y, for file system check, and "yes" to any necessary fixes. With Panther, however, the default is to have journalling on -- a method of recording what the system settings are -- and the check has to be forced, with fsck -fy or fsck -yf or even fsck -y -f.

    We also discussed other start up keys and I demonstrated the "Safe" startup (temporarily disables login items and non-essential kernel extension files) that is effected when the Shift key is held down. There are also the "Command + V" keys for the verbose startup (text appears like the single-user start and it may be possible to see something in the procedure that is causing, for example, a delay); the T key for startup in target mode (one computer connected to another via Firewire). Pressing X during startup forces Mac OS X to startup; Option-Command-Shift-Delete during startup will bypass primary startup volume and seek a different startup volume (such as a CD or external disk); press C during startup will start up from a CD that has a system folder; N will attempt to start up from a compatible network server (NetBoot); R will force a PowerBook screen reset.


    Software
    As we had talked about some programs like MacJanitor (all of those I mentioned are available from Versiontracker), I realised that I had them with me on the iPod. One of the members came up with a thumb drive and I copied several of the shareware and freeware applications I had with me. There was not enough room to copy the 10.3.6 Combo update that I also had. While going through the list of software, we discussed the value of some and why some were perhaps not so useful.

    Endnote
    After the photogaphs at the end of the session, one of the members asked me about OSX on a Wallstreet. As luck would have it, a user from the US had also asked me questions about the same computer, so I was armed. The Phuket Wallstreet user had put in a 30G hard disk but had been unale to install OSX. What he needed to do was to partition the disk and install OSX on the first 8G (or perhaps 7.75 as it needs to be less than 8) partition; and the Wallstreet will only run up to 10.2.8 so Panther is out.

    I had a pleasant 24 hours and look forward to similar such events which bring other Mac users together. Let us hope that, with sales beginning to rise again, there will be more new users next time round.


    All materials ©copyright G.K. Rogers. Free for individual use.

    Other links:


    Bangkok Post, Database
    Mac Center: Thailand
    OSX Faq Mac Dr Smoke's X Lab Site George Mann
    Applelinks MacNightOwl MacNightOwl


    Phuket Mac User Group


    For further information, e-mail to Graham K. Rogers.

    To eXtensions, Current items

    To eXtensions, Year Two

    To eXtensions, Book Reviews

    To Education Page

    To Motorcycles Page

    Back to homepage