top of page
Search

Old Blog

05/08/2017


Submit support tickets

I’m trying out a support ticket system so I can keep up with people requesting help. Sometimes my email can be difficult and emails get lost in the volume. This will help me help you and cut down on emails not being attended to quickly.




16/09/2015


Good time to replace my iPad Mini




03/09/2014


iCloud hack into photos of Celebrities

Looks like this is a case of someone who can guess and brute force their way into your identity.

The security questions for someone who is well known, maybe even biographies about them can make it simpler to work out the security questions. Apple did have a flaw that they closed but these current hacks have been investigated and looks to be the case that most of us wouldn’t face.


• Make sure you have good passwords.

• Make sure you don’t use the same password on different websites/services.

• Set up Two Factor Authentication


Frequently asked questions about two-step verification for Apple ID



Interesting read from Appleinsider


Editorial: Google, Microsoft claiming Apple’s crown, albeit from 1994


29/05/2014


Australia’s iCloud being hacked


This isn’t turning out to be true. Seems like people are re-using their same usernames and same passwords for different sites. Maybe even the same secret questions.


What is scary is that another company may have been hacked and the hackers are trying that list to get into your iCloud account.


To get around this I use 1Password which isn’t cheap. I used to use Password Wallet, there are quite a few. I generate a different random password for each website.


Another option is two-factor authentication. A lot of sites use this now. You can receive a txt when your account is changed or new login on a computer to confirm it’s you.




The best way to use a lithium-ion battery, redux


Our initial guide clarified a great many things about lithium ion batteries and the ways they can differ from other types of batteries. These differences once used to strike fear into the hearts of consumers. For instance, Li-ion batteries, unlike nickel-based batteries, and don’t get their capacity “confused” by shallow discharges. In fact, frequent and shallow discharges are the best advice for keeping a young Li-ion battery fit and trim.




Turnbull lies on NBN to Triple J listeners


News Malcolm Turnbull yesterday made several statements on the ABC’s Triple J radio station regarding financial projections for Labor’s National Broadband Network project which the Communications Minister is aware are false, with the former investment banker inaccurately conflating investment capital and government expenses for the project as well as exaggerating financial figures.




Beware of phishing attacks


Basically be careful of anything that automatically asks for a password to install or click on a link to verify.




Robotic Printer


This is something I find fascinating. Personally I need a really portable printer and this seems to fit.





08/04/2014


Dodgy emails

I’ve received a few emails pretending to be Apple and Google. Other clients have received them as well. They look very authentic and may say something like you need to verify otherwise your account will be disabled.


To check, don’t click on the link. See who it’s from, that’s a simple give away or move you mouse over the link but don’t click. That will tell you the link.


Usually I manually go to the website


e.g. http://appleid.apple.com


or


http://www.gmail.com


Depending on the email and you can confirm there is probably nothing wrong.

Also be careful of Domain renewals. A company sends a snail mail with a very expensive charge for the domain renewal. Be careful of those as well.





How to ward off iMessage spammers


From MacIssues

How to ward off iMessage spammers


Apple’s iMessage service is the default messaging system for anyone using OS X or iOS, so if you use one of these systems then you likely have an iCloud account active and ready to receive messages. Unfortunately, at times and especially if you have a popular iCloud user name, you may receive spam texts and other messages through your iCloud account.


Any spam can be frustrating, but if you receive bothersome messages through iMessage, they will display in Apple’s notification center, and sound your new message alerts, or even cause programs like Messages or FaceTime to launch.


If you are receiving spam in iMessage, then there are several ways to manage it.


Add to blocked list.


The first option is to add the spammer to iMessage’s blocked user list, which will prevent you from receiving any communication from that user:


Go to the Messages preferencesClick the “Accounts” sectionSelect your iCloud accountClick the “Blocked” tabClick the plus button, and select a contact to blockDo not disturb


If you do not wish to block people, but instead only prevent from being bothered for a short time, then your best bet is to use Notification Center’s Do Not Disturb feature. To do this, simply click the Notification Center menu extra (to the right of the Spotlight menu), and then scroll up to reveal the “Do Not Disturb” toggle. Click this toggle to prevent any notices from coming through.


Report the spammer


Apple has recognized the problem with spamming in iOS, and has a service you can use to report spammers and have their accounts blocked:


Take a screen shot of the spam message you received.Note the date and time the message was received, and the spammer’s e-mail and phone number.E-mail this information to “imessage.spam@icloud.com.”





Microsoft Office Activation FAQs


I get asked about activations frequently. Here are the answers for Microsoft Office for Mac.





Study: Apple has most secure password protection out of top 100 e-commerce websites.


Read more at http://macdailynews.com/2014/01/25/study-apple-has-most-secure-password-protection-out-of-top-100-e-commerce-websites/#tzCOUHg36BqRcc2b.99


I get asked about passwords all the time. Interesting read…





20/01/2014


Interesting Reading about the days of QuarkXPress

http://arstechnica.com/information-technology/2014/01/quarkxpress-the-demise-of-a-design-desk-darling/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+arstechnica%2Findex+%28Ars+Technica+-+All+content%29





06/11/2013


Nice and fast





Finally getting some nice speeds. On Telstra cable.





17/10/2013


re: Netregistry for mail and Web hosting

This is an email I sent to Netregistry as a complaint. Most of my clients are with Netregistry and this is what I sent them today.



... Over the last couple of months, I have been stretched support wise from my client base. Netregistry used to be very reliable and now I have lost confidence in the company. I have required imap with a good amount of storage and have moved a lot of clients towards cpanel products. I still have many on cloud products and they can be just as unreliable.


It’s going to be a major effort to move away and I know you have been migrating to new products lately.


– Has you reliability improved on these new servers– What are you doing to reduce down time.


Regards

Michael





iOS 7 feature focus: Quick access to ‘.com,’ ‘?’ and other hidden keys


With iOS 7, Apple’s touchscreen keyboard has been revised, offering new capabilities and also changing the functionality of some previously available features, like the “.com” button in Safari.





20/09/2013


If you’re buying a 2nd hand iPhone


https://support.apple.com/kb/HT5818


How do I check for Activation Lock before purchasing a used device?


When purchasing an iPhone, iPad, or iPod touch from someone other than Apple or an authorized Apple reseller, it is up to you to ensure that the device has been erased and is no longer linked to the previous owner’s account.


Follow each of these steps to make sure that you can use the device you purchase:


1. Turn the device on and slide to unlock.If the passcode lock screen or the home screen appears, the device has not been erased. Ask the seller to completely erase the device by going to Settings > General > Reset > Erase All Content and Settings. Do not take ownership of any used iPhone, iPad, or iPod touch until it has been erased.


2. Begin the device setup process.After choosing a language, choosing a country, and connecting to a network, the device will begin activation. If you are asked for the previous owner’s Apple ID and password, the device is still linked to their account. Hand the device back to the seller and ask them to enter their password. If the previous owner is not present, they can remove the device from their account by signing in to icloud.com/find. Do not take ownership of any used iPhone, iPad, or iPod touch until it has been removed from the previous owner’s account.

You will know that a device is ready for you to use when you are asked to “Set up your iPhone”, “Set up your iPad”, or “Set up your iPod” during the device setup process.





18/09/2013


New IOS for the iPhone


Our time Thursday should see new software for the iPhone. It will look different and take a bit of getting used to. It’s important to sync with iTunes to get a good backup.


In Devices, click on your iPhone then click on the Summary tab. Turn on Encrypt iPhone (iPad) Backup. This will back up your passwords as well. Much better for restoring.





13/10/2012

New Site


TeamViewerQS




This is a work in progress.

Contact Details

Michael Kennard

0402 130 132


Recent Posts

See All

2019

Welcome to 2019 and I created a new blog on my site. The last one got a bit stale and I moved away from Wordpress. Looking forward to changes in 2019 and this looks to be an exciting year. All the bes

bottom of page