Meeting Notes

Meeting Notes September 19, 2016

posted Sep 20, 2016, 2:32 PM by Robert Brown

SVMUG Meeting September 19, 2016


FBI Sued for Info on iPhone Hack



FBI Issues ‘real’ PSA re Ransomware

Dropbox ‘Kerfuffle’ 1

Dropbox ‘Kerfuffle’ 2

Nothing REALLY to about == but Dropbox is now compatible with Accessibility tool under MacOS. Problem: it did not ask the user’s permission first. It is used to allow MS Office to save documents to Dropbox, along with other applications. Apparently it will re-install if you take if off manually. It seems to have been an oversight. 

Flash (of course)

Be Suspicious of Texts Requesting Security Codes

Google is being spoofed in texts, in an attempt to gain access to accounts that are protected by two factor authentication. 

Android Has a Bad Week



Tim Cook,Apple, & China

Tim Cook is paying special attention to China, as he must do because China is a difficult market to crack.

Analysts Reaction to iPhone 7, etc.

iPhone 7 is successful beyond belief, at least the limited belief of analysts. Curiously, analysts like the Airpods.

Analysts Like AirPods


General News:

Apple Buys AI Company, Turi

Samsung Note7 Problems May Help Apple

Samsung Effort to ‘Beat Apple’ Led to Recall

Apple Event September 2016 Report

Sierra Launches Tomorrow

iOS 10 T-Mobile Bug Fixed



iOS 10.0.1 - Note, iOS 10 is also a security update

Watch OS 3  

Note Warning on Sierra & Scan Snap s/ware

The PDF files created with Scan Snap may not be compatible with MacOS Sierra — the pages in the file will display as blanks.



October Event for iPads & MacBook Pros?



How to set up Spam Call Blocking


Presentation - Tech Tool Pro by Micromat, Inc.

The demonstration was performed under MacOS Sierra.

Tech Tool Pro is a hardware diagnostic, disk utility, and disk optimization tool.

Version 9.


Runs five tests on starting the application: USB, cache, processor, network, Thunderbolt.

The Suite of tests available include memory tests, file structures, surface test, SMART check, Partition Map, video test, battery check, fans test, sensors test, Bluetooth, and others.

The battery test includes a cycle count, which is an indication of when the battery might need to replaced.

Tech Tool Pro can detect slow developing problems on drives that are otherwise missed. 


Volume repair / partition repair

Uses same methodology as Diskwarrior  but each tool has its own strengths. 

— but remember, no repair tool will be as reliable as having a full backup of the disk!

eDrive is used to create bootable partitions on any drive, except the main system drive. It can be on an external drive, or an SD card, or whatever else can be a mounted file system upon startup.

Tech Tool Protogo (“Pro to go”): make a customizable bootable disk, on USB or Firewire or whatever. 

Volume Cloning - one to one clone - make a bootable clone.

Data Recovery - for magnetic drives, not solid state drives.

Wipe Data - for security

Volume Journaling - enable or disable file system journaling - the journal file is a log of the changes made.

Processor check - tests processor against known benchmarks.

Audio and Video tests.

…and Reports of all of the above.

Micromat, Inc. is based in Santa Rosa. It employs ten people. 

Upgrade pricing is available from any previous version $39.99

Regular price $99.99

SVMUGOFFER916 is a coupon code for 20% discount - expires October 31, 2016. Go to the online store at 


Open Source

KeePass -

Questions and Answers

1. Problems using BCC in a contacts group for the purpose of a mailing list. The mail is composed in Apple mail, and sent via a basic ISP. 

Apparently Apple Mail is not expanding a Goup name into addresses when the Group has been placed into the BCC field. 

Maybe you need to delete the “previous recipients” list in Apple Mail.

2. Is Quicken 2007 Lion Compatible, also compatible with Sierra?

No one has confirmed or denied.

August 15, 2016 Meeting Notes

posted Aug 19, 2016, 9:05 AM by Robert Brown

SVMUG Meeting August 15, 2016

News and Events


Apple (Cook) Holds Firm on Taxes

Expects to pay no repatriation without “Fair Rate”.

35% would be paid if off-shore money was brought into the USA.

He points out that most of Apple profits are generated from overseas sales.



iPhone Theft Victims Beware of Phishing Attempts

Beware of emails that appear to be from Apple

claiming that help is available on a web site to

recover a stolen iPhone. They are actually trying

to obtain your Apple ID password.

Link Explaining More re iPhone Theft Victims & Phishing

Apple Begins Bug Bounty Program

up to $200,000 for reports of bugs

in iOS and iCloud. But the offer is

only for invited researchers, of known


Apple urls for reporting phishing emails & iCloud emails

forward phishing emails to

other suspicious emails to

Some Ransomware Does Nothing When You Pay

Rival Ransomware Gang Sabotages another

Site for Recovering Data w/out Paying Ransom

Tech Companies Use Anti Drone Techniques?



Berkshire Increases AAPL Holdings

up by 55%

Apple Makes $ on Pokémon

will make $3 billion from the Pokémon craze


General News:

No, Apple is NOT Making a Tank

It was another company, mistaken for Apple

Complaints about ‘No New Macs’

Rumors of new Macs in the Fall.

Apple Getting More Corporate Business

Steve Jobs did not put much effort into enterprise customers

but new business is coming from enterprise customers for iPads, iPhones.

Tim Cook Interview 

Tim Cook’s Apple

Apple Selling Wholesale Energy

from their solar panels



iOS 9.3.4

Public Betas Updated 



Apple Watch Fall Update w/GPS & More!


Home Automation - Doorbell -

Jamie Siminoff — CEO of Ring -

The product is an intercom/camera/doorbell that communicates over the internet.

WiFi enabled doorbell with one-way video, two-way audio

+ additional cameras for use in the home.

The original was the “doormat” which he built for himself for his needs, not expecting to turn it into a company.

Launched in 2012 at the Paris Web event.

$199 full retail price classic

$249 full retail price Pro version

They appeared on “Shark Tank”, which brought in publicity and sales.

Doormat was shipped at the end of 2013, but they realized it was really a beta product.

They retooled and built Ring, bringing it out in 2014.

Sir Richard Branson has invested.

They are now in stores like Target, CostCo, Amazon, Lowes, …

Q: IoT providers are not usually security conscious. What do you do to protect the device from hackers intruding via the network?

A: There is a big financial gain for us to lead in security.

The system will be streaming video in 600 milliseconds, sent to the cloud servers.

A member comments that he knows of users who have found the system to be too slow.

The auxiliary cameras - stick up cameras - are battery powered as well. 

The cloud storage costs $3 per month or $30 per year, and the videos are saved for six months.

They will be compatible with the forthcoming release of HomeKit.

Under normal use, the battery only needs to recharged every six to twelve months.

Peer-to-peer operation is expected in a few months.

Are you concerned about China manufactured knockoffs? You have to out-execute the competitors who are making knockoffs.

California is an All Party Consent state —

Classic: dual powered door camera - uses both battery and wired powered.

Pro: works only off doorbell wires

A solar panel can be installed to trickle charge the doorbell.

You may share access to your door camera and videos with others, e.g. a neighbor.

Motion detection by heat detection can be filtered on the Pro version to reject non-human events.

SVMUG discount code: 9svmug 

Open Source

The Markdown text formatting syntax standard.


1. Is there a replacement for AppleWorks for drawing?

EZDraw. — available in the App Store or at the web site.

There is a trial license available. Look into Libre Office as well.

2. — will pull up alternative software

3. Measure upload speed of my connection.

4. Why is the Apple iTunes Store unreliable — outages of one to four days.

It may not be the ITS, but could be your ISP.

Try using LTE instead of WiFi.

5. iOS and iCloud Photo Sharing. Can the cache size setting be adjusted. 

We will have investigate.

April 18, 2016 Meeting Notes

posted May 2, 2016, 3:08 PM by Robert Brown

SVMUG Notes 

April 18, 2016

News and Events


60 Minutes Phone Hacking Story

Note that there were three vectors i) fake hotel network, and ii) downloading a file (via text), plus one ‘Bluetooth Driveby’

proficient hackers demonstrated hacks.

man in the middle using fraudulently WiFi hotspot

Defense: environmental awareness, and use a VPN.

“Apple ID due to expire….” - Text Phishing attempt

throw away such messages — it is a fraud.

Apple Fixes Bug That Allowed Access to Contacts & More

0Day Flash Flaw Used for Ransomware (Windows) But….

Apple Says ‘Most Effective Security Organization in World’

Windows?  Uninstall QuickTime

Do NOT Pick Up USB Sticks…. DANGER!

ARRIS SURFboard Cable Modems Need Updating


FBI Drops San Bernardino Case Against Apple

Bryan will cover this in his presentation tonight.

‘Grey Hats’ Help FBI Crack San Bernardino Phone

No Useful Info on San Bernardino Shooter’s iPhone 5c

Apple Quotes FBI in Boston iPhone Case

DOJ Continues Appeal of NY iPhone Case

No Obama Support for US Senators Feinstein & Burr Anti-encryption Bill 

empower judges to force companies to assist law enforcement

Bloomberg on Background to FBI v Apple

Paris Terrorists Used Burner Phones

Microsoft Sues US Gov’t 

over orders to reveal customer’s emails and a gag order on those orders

Apple & FBI Testify to Congress - Again

General News:

Bill Campbell Passes On

WWDC Dates, Lottery Announced 

Enterprise Employees Choose Apple

Apple Grows Share of Worldwide PC Market


Stock Down on Supply Chain ‘Concerns’


Next iPhone May be Glass

Apple Doing More Original TV?

New MacBook on the Way?


Office 2011 for Mac - Security Update

iOS 9.3.1 - Fixes Link Issue with 9.3

Presentation — Bryan Chaffin

FBI versus Apple and The People

1990’s - crypto wars, our intelligence agencies try to prevent encryption technology from being exported.

— so the foreign tech companies developed their own.

— now twenty years later, we are making a similar mistake.

is there a way to let only the good guys to snoop? Reason dictates that is not possible. If keys exist, everyone can look for those keys.

Also, if you give the government the ability to spy secretly on anyone anytime, how long until they get around to spying on you?

Open Source — GnuCash

Questions and Answers

1. Preview has a memory leak when dealing with PDF files. Recently I had to do a lot of work with PDF, and lost 40 GB of disk space. How do I recover this space. 

We think it should be a cache file management problem. Also Preview may be saving versions of files, but that should be visible. Maybe virtual memory files are eating disk space. Perhaps a disk optimization program might find the missing space. Use the console to check for recurring errors. Perhaps the logs are increasing without limit. 

2. Booting up MacBook Pro, it seems to always use a WiFi connection rather than an ethernet connection, even though the ethernet is plugged in and ready. 

In Mac System Preferences -> Network Settings, you can enable several different connections simultaneously. The priority by which each will be used is set by the order in the list of connections in the network settings control panel. If you wish ethernet to have the highest priority, simply drag the ethernet item to the top of the list. 

By the way, the same is true for setting the priority of WiFi connections, should more than one WiFi “hotspot” be available in a given environment. Simply drag the item for the most preferred hotspot to the top of the list that is found under Network -> Advanced settings.

March 21, 2016 Meeting Notes

posted Apr 18, 2016, 2:38 PM by Robert Brown



Ads Spreading Malware/Ransomware

(Flash, Java, Silverlight)

Use AdBlockers as a Defense?

Reason to Stay Up to Date

First Mac Ransomware (Near Miss)

    No actual damage done for three reasons:

1) the malware was designed to stay dormant for 72 hours (presumably to make it harder to figure out where it came from)

2) Transmission, the vendor, responded promptly with clear and accurate messages to users, and, with an updated version of Transmission that removed the malware. (Bad Version only there for 36 to 48 hours)

3) Apple responded quickly by revoking the developer cert used to sign the malware, and adding the malware itself to XProtect. Revoking the cert stopped the malicious installer from passing gatekeeper, and adding the malware itself to XProtect prevents it from running, even on systems that installed the malware before the dev cert was fixed.

The end result of all this is that it seems like none of the few thousand people who contracted this malware lost any data. So – in real terms this was not actually a major disaster, it was however a near miss!

from Bart Busschots on

AceDeceiver - Only for PCs in China

Update Flash, You Use it

Mac Users Targeted by Misspelled Domains

Good News - iCloud Hacker Guilty



Supreme Court Agrees to Hear Samsung v Apple

Supreme Court Declines to Hear Apple re iBook Case

FBI Gets Nasty - Threatens Source Code

FBI Could Crack the Phone…. Here’s how

UN Human Rights Commissioner Supports Apple

FBI ‘Facts’ - Not so Much…

Dormant Cyber Pathogen

Another Former CIA Director Sides with Apple

Richard Clarke (Former Counter Terrorism, etc.) Sides with Apple

Apple’s Legal Argument Looks Good…. Harvard Law Prof.

Senator Lindsay Graham Switches Sides

Proposed Legislation from Feinstein

Tim Cook Time Mag Interview

NOW FBI Says ‘Never Mind’

(John Oliver on Encryption, FBI, etc.)


General News:

Apple Hires Amazon Exec as Security ‘Chief’

Apple Moves to Google for Cloud Services

Apple & Google Face European Parliament 

‘News’ App Now Open to all publishers

93% of Apple Facilities on Renewable Energy

iPhone SE

iPad Pro 9.7”

iPad Air II Now Starts @ $399

Apple Watch Gets Lower Price & New Bands

Meet Liam



iOS  9.3 - must have for security

OS X 10.11.4 - 

iTunes 12.3.3 - 

Watch OS 2.2

TVOS 9.2

Xcode 7.3


Quicken 2016

Marcus Aiu and Jeff Parker from Quicken presenting.


sneak preview - right now have a per month budget. New: budget over a full year. Currently, this is “alpha” code.

New: direct connect bill pay. 

Buy: and the Mac App Store.

and vote for new features.

Raffle: a copy

Q and A

1. Limit the number of emails that are displayed in the recent emails of the iPhone.

Limit the downloading of emails to the iPhone. Try creating folders for different categories of mail, using the tools on the server. 

2. When you click on a purchased TV program, can you set the preferences to show only the most recent episodes, rather than the whole list of episodes? Otherwise you do a lot of right swiping to find the desired episode. 

We are not sure

The download buffering estimate seems wrong. 

This is because of the way Apple TV attempts to estimate, based on the first few bytes, and the byte rate average.

3. When I add events to my Gmail calendar, the events show up in my iPhone calendar, but not vice versa. Can I fix this to work both ways?

On the iPhone, under calendar settings, set default calendar to Google. 

The iPhone fetches data from multiple calendars, but creates events in only one calendar.

4. How do I delete a recovery disk (recovery partition). 

Normally, you only see the Mac partitions — the recovery partitions are only shown if you use an “option” boot. 

Frankly, you should not delete the recovery partition. It is necessary.

5. Is there a way to prevent iCloud from opening upon startup? I have an ATT cell phone modem, called “ATT All Access”. I am shown two successive iCloud sign-in windows, which takes forever to connect. 

November 16, 2015 Meeting Notes

posted Nov 17, 2015, 8:29 AM by Robert Brown

SVMUG November 16, 2015



Malware attacks KeePass - OS Password Manager

Ransomware Threatens to ‘Publish’ Your Data

1Password Metadata Leak 1

1Password Metadata ‘Leak’ 2 - Response

Still More on 1Password Metadata (Scroll down to ‘Security Lite)

Apple Phishing Scam

Apple Removes Malware Instagram App from iOS Store


Updates iOS, Watch OS, and OS X

Apple TV 4 Available

Apple tvOS 9.01

iPad Pro is Available (Robert has one!!)


Apple Wins Dismissal of ‘Bag Search’ Lawsuit

Apple goes to Supreme Court over iBooks


Apple Reports Financial Results

Analysts React (Mostly good)

Apple Capex $15 billion in 2016

General News: 

Steve Jobs Movie Pulled - Poor Box Office Results

Mac App Store Has Certificate Problems

Apple San Jose Campus??

iPad Pro Goes on Sale

Australian Apple Store Racial Profiling Gets an Apology, & More

Tim Cook on Climate Change, Equal Rights, etc.

Amazon Removes Apple TV & Chromecast from its Store

Apple Launches Clean Energy Programs in China  Greenpeace Likes It


Apple to Launch Person to Person Apple Pay?



Swift Programming for the non-programmer

What is a programmer?

Flexibility, ease of use, portability, and speed

languages before Swift: problems and solutions

What is Swift? How is it different?

Programmers create instructions intended to cause a computer to do some work.

Users are just programmers who believe anything you tell them.

stored instructions: program, playlist, bookmark, app, Macro, script, shortcut, … html, document…

Programmers care about flexibility, ease of use, portability, and speed.

The Facebook web interface makes it very easy to share a post on Facebook,

but you can’t use it to write a program to solve a math problem.

Using Assembly language you can write a program to do anything,

such as posting to Facebook,

but it takes much much more work then using Facebook.

Trade-off: ease of use versus flexibility

Portability is also a concern. Where can I run the program?

Facebook runs everywhere (via web browser).

But assembly language is very specific to the platform.

Speed is also important: how fast is a program after I write it.

— Find the Middle Ground —

Flexible enough yet easy enough

portable enough yet fast enough. 

Control Flow: specify the order of execution of program statements

Spaghetti code: a program where the control flow is hard to follow.

With spaghetti code, different parts of your code can be meshed with each other,

so that changing one piece might break some other piece, especially in unexpected ways.

Excel Macros are flexible but not easy to use — makes spaghetti code inevitable.

Furthermore, it is not portable (works only in Excel), and not particularly fast.

solution: C

— create anything

— easy to create simple elegant code

— portable - everything has a C compiler.

— Speed - very fast

[Sidenote: a compiler takes readable code, e.g. English, and converts it into machine code (or “byte code”).

“The nice thing about C is that you can do everything. The bad thing about C is that you must do everything.”

Solution: object oriented programming: objects encapsulate data with the code that operates on that data.

— code becomes a loose collection of objects.

— the objects are replaceable without great modifications to the rest of the code.

— objects encapsulate code

“Objective-C”, “C++”

Objective-C is a strict superset of C.

— perhaps not quite as easy as plain C

— it was designed to portable, but really only used for Apple devices

— fast, but not as fast as pure C

Apple’s Goals for Swift

- safe

- modern

- fast

- interactive

- open source


- No “silent consent” for unexpected conditions

- Better memory protection

- No selectors.

If Objective-C encounters an unexpected condition, e.g. null pointer, it does nothing, generates no exceptions, no errors.

Swift will deliberately crash the program. This prevents problems later. 

Memory Protection: C can wander around in memory, changing stuff that should not be changed.

Swift will enforce array bounds, rigorously check for overflow, and uses no pointers by default.

In C, C++, or Objective-C, it is easy to accidentally modify memory.

Swift does not support selectors. This allows for the creation of private code that other objects are not allowed to call.

Modern: “when Swift was release, everyone said it was just like their favorite language”

— modern nice syntax

— Swift source code is usually shorter than Objective-C source code.

Fast: significantly faster then Objective-C.

Interactive: not a feature of the language, but of the creation tools (Xcode).

— playgrounds execute code automatically.

— — see the results instantly

— — can use Apple frameworks

— — can use image and sound files

— — no need to embed code in complex programs, to see the results.

Open Source: at WWDC 2015, Apple announced that Swift would be made open source by the end of the year.

— it is not the end of the year, yet.



1. Best Swift book for novices is the Apple Swift book. (Currently version 2.1 in iBooks.)

2. How to speed up file sharing between two Macs?

— Use WiFi for the connection.

— AirDrop is also very quick.

3. I am getting restarts in Yosemite. Is this a bad sign? No problems are found in diagnostics. “Your Mac restarted because of a problem.”

— possibly the HD is starting to fail.

— use Disk Utility to read the SMART data on the drive.

— Google kernel restarts - there is an Apple Support Document.

— try EtreCheck

4. How do I view an email in ‘source text’ without opening it?

— you have to open it.

— in the mail list, force touch the mail item or use the menu “view” -> “message” -> “raw”

5. Suggestions of where to start learning programming?

— pick something simple, write it.

— then move on to more complex things.

6. I can calibrate my monitor using the Apple tool. What can I use?

— Use Spyder Pro, X-Rite Pro, etc.

7. New iPhone 6+ — try to transfer my SIM card, but AT&T says I need a new SIM card for new features. What are these features?

— only AT&T knows — ask them at the retail store.

— it might be the WiFi calling, and HQ calling.

October 19, 2015 Meeting Notes

posted Nov 16, 2015, 2:09 PM by Robert Brown

SVMUG October 19, 2015 



YiSpecter Malware - for iOS

    distributed by enterprise administration, not via iOS App Store

Apple Removes ‘Continue Button’ (iOS9)

    Enterprise administration can get around this.

Flash - of course - Advice on Flash

Apple Removes Apps that Could Spy


    Safari 9m iOS 9.02
    iWork for iOS & El Capitan 
    Apple Ordered to Pay U of Wisconsin


Apple to Report Earnings Oct. 27, Call @ 2PM

General News:

Figuring Costs on New iPhones

Gary Allen, Founder of IFO Passes On

Apple Initiates Help for Apple Music via Twitter

El Capitan problems with Office ‘Apple’s Fault’

Apple Launches Program for MacBooks with Screen Issues

IBM Likes Using Macs Photo from the Past

‘ChipGate’ - Much ado about Nothing 1

‘ChipGate’ - Much ado about Nothing 2

Steve Jobs Movie

Economist Review of Steve Jobs Movie

‘Old News’ - Ron Johnson and a Startup

Harry Potter Books on iBooks


1. Is there a browser that will reflow text when you zoom in on a page?

This is, today, mostly related to the coding of the web site: is it “responsive”.

Try using landscape mode to help.

2. I have some old Adobe Type Fonts. Is anyone interested in these?

Contact Gary.

3. System Report: storage tab displays a lot of device images in “/tmp” with BSD names.

Perhaps you have some old disk images still mounted? Use Disk Utility to locate the offending items, and eject these.

4. What is the safest way to dispose of SysQuest or Bern. disks, with sensitive information?

Drill a physical hole through the disk. 


Apple Car

Rumor: Steve Jobs wanted to make a car — he was in to cars.

Tim Cook: a car is the ultimate mobile device.

Software has become more important than mechanics.

Apple is the best software company on the planet.

(Apple has NOT become Microsoft, because Apple doesn’t suck.)

Google may beat Apple with having a ready-to-go car.

But it will not be as “pretty” as Apple’s. Or “neat” as Apple’s.

(Before Google, Larry Page has been thinking about

self-driving cars since the early 1990’s.)

Apple has special experience in power conservation.

The Apple car will a luxury item, maybe at $70,000.


August 17 & July 20, 2015 Meeting

posted Jul 21, 2015, 9:18 AM by Robert Brown   [ updated Nov 16, 2015, 2:13 PM by Robert Brown ]

August 17, 2015


Silly season: DefCon and Black Hat conferences

Thunderstrike 2 

An attack using Thunderbolt cable chips as a infection vector.

However, it is a low impact.

Screen shot of a scammer attempt 


— this ransomware that targets naive Windows users.

— completely bogus

Screen shot of Apple Fixing bad stuff

“Installer” will damage your computer. You should eject…

— this is a real warning, generated by the Apple malware scanner.

— pay attention if this pops up on your computer.

Zero Day Privilege Escalation Bug in OS X Yosemite (patched)

has been patched in 10.10.5

Cyber Flashing & How to Stop It

A woman on the London subway opened her phone

and saw a genitalia image (a human flasher). The

vector was AirDrop, so it was a naive user enabled


Update Firefox for Security Zero Day

Be sure to update. 

New Vulnerabilities Still Exist….

Don’t run Flash unless you have to.

And just today, an Italian research found a theoretical 

vulnerability. He notified Apple, but then one hour later,

released the details to the public. Normally, such a

researcher would wait for the company to respond.

This was very bad on his part.


Firmware Update for Latest MBP

10.10.5 - Very important - contains lots of security fixes

iOS 8.4.1 - also lots of security fixes


EU Finds No Music Collusion

Apple Wins One Against Samsung


Apple Earnings - Overview

— beat estimates in revenue and eps,

    but not for iPhone unit shipments.

Analysts Reactions on Earnings

Apple Spends on R&D

A Postive Analyst on Apple

Apple #15 on Global 500

General News: 

Apple to Have Visitor Center at New Campus

50% off Selected TCO Books for MUG Members

Apple Pulls Nest Thermostats from Stores

Apple Music Streamed for Free by T-Mobile

Apple Expands Office Space

Apple Expands… ?


Apple Car - Yes?

Self-Driving Car - Maybe not?

Apple Event Sept 9?


Presentation - Home Automation

by John Rich, author and journalist and photographer,

Download this presentation from

Automate your home and vehicle using smartphone or tablet, with technology that is available today.

Your iPhone and/or iPad can become a powerful remote control for many other devices and appliances.

Control Lights

Door Locks & Doorbell


Home Security 

Television & Stereo

Vehicle Navigation (GPS)

Car Maintenance

Infotainment System

Hands-Free Cell Phone


Open Source

Q and A

1. Thunderbird email app - accidentally closed inbox viewer. How do I get it back?  

— we will investigate

2. When I expand Finder column widths, it does not persist when I open new Finder windows. 

— hold the option key when dragging the column borders.

3. Apple ID - cell texts go arbitrarily to either Messages or email. How do we set this?

— Messages will try to use the relay of “Messages to Messages”, but if you are offline, it will use a secondary method, e.g. email, cell SMS.

4. I need help loading 10.5 onto a G4 Powerbook.

— 866 MHz CPU and 512 MB RAM is required.

5. When I copied a file, the file size was different on the copy. Why?

— Maybe block sizes are different. Maybe the metadata was changed. Maybe the copy is more efficiently de-segmented.



July 20, 2015


Flash - Zero Day vulnerabilities and Controversy

Back story of Hacking Team Hack


Apple Boots Monster after Beats lawsuit

Apple Requests Legal Fee Reimbursement from Patent Troll


Earnings for FY Q3 Tomorrow

Analysts weigh in - One Sample

China Market goes down - People Worry, Then Stop Worrying

General News: 

Apple Upgrades AppleCare for Bateries

Apple Gets ‘Good Marks’ from EFF

Apple Watch Satisfaction - a Debate

Taylor Swift and Apple Music I

Taylor Swift and Apple Music II

Apple Releases Public Betas of OS X & iOS9

IDC Guesses Lots of Macs Sold

Apple Hires Auto Exec

Quirky News:  

New Software for Apple IIgs


Apple likely to up iTunes Match

Apple ‘Over the Top’ TV Service?


New iPods

Microsoft Updates Office for Mac

OS X 10.10.4

iTunes 12.2  NOTE: NEW TCO BOOK OUT, See Discount code on Agenda 




Apple Music - Jeff Gamet, Managing Editor of MacObserver

Apple Music is part radio station, part streaming music, part music storage, and part musician social network. That’s a lot for for a single new online music service, and depending on how you use Apple Music, it can be a little confusing. Jeff will show us the new features that Apple Music gives us and point out what’s changed from iTunes Radio and iTunes Match. We’ll also find out which devices support listening to Apple Music.

Via Skype and the MacObserver Web Site.

Catch Jeff’s weekly podcasts.

What is Apple Music, as compared to iTunes, iTunes Radio, iTunes Match?

Three components

1. Beats One — Apple’s own Internet radio station

much like a traditional radio station, 

with DJ’s, music, interviews, call in requests, etc.

“old school radio station”

Zane Low is the station manager.

Beats One focuses on Pop Music.

Maybe in the future, there will be a Beats Two, Beats Three,

and so forth for separate genres of music.

2. Apple Radio — this is iTunes Radio retooled. 

This is a genre selectable streaming service.

A computer algorithm put together the stream 

for iTunes Radio, and made odd choices at times.

However, human curators put together the streams 

for Apple Radio. The ideal is to hear a mix of songs

that you already know with news songs that you do not.

3. “For You” music collections — hand curated recommendations.


iTunes Match vs. Music in the Cloud

iTunes Match — takes your purchased library and puts it in the 

cloud so that it is available from the Cloud on any of your devices.

The purchased library includes CD’s that you have ripped into your

library. The artist royalty was paid out of your original purchase price.

Apple Music in the Cloud — you can listen on demand to any item

in the catalog of iTunes, and the artist is paid a per-play fee.

This is a subscription service. 


Apple chooses the music curators very carefully, 

looking for expertise in the given genre. 


DRM - Digital Rights Management — Apple Music allows you to download music for per-play-fee listening, under your monthly subscription. So it has copy protection. This means that should you end your subscription, any downloaded songs still present on your hard drive will be unplayable.

If you have a given item in your purchased library, you will play the non-DRM file. If you do not have the item in your purchased library, you will download and play the DRM file.


Without Apple Music Subscription, you get these services:

listen to any music you've purchased, ripped, or uploaded to your device. 

(If you pay $24.99/year for iTunes Match, you'll be able to listen to any music 

you've uploaded to iCloud, regardless of whether it's on your device or not.) 

listen to Beats 1 radio, view and follow an artist's Connect stream,

listen to ad-supported Apple Music radio stations 

(which replaces the current iTunes Radio interface)

—though you'll only have limited song skips available.

With Apple Music Subscription, you get these additional services:

  • unlimited skips for Apple Music radio stations
  • the ability to like, comment, play, and save Connect content
  • unlimited listening to the entire Apple Music catalog
  • the ability to add Apple Music songs to your library and listen offline
  • your entire purchased and ripped library, uploaded to iCloud
  • access to Apple Music's hand-curated recommendations and playlists
  • ==================

Apple Connect — a social network for artists to interact with fans 

(but not for fans to interact with artists).

It is the modern version of “liner notes”.

  • ==================

Jeff believes that Apple Music is aware of your connection method, e.g. LTE versus WiFi, and will appropriately choose the best bitrate for the given connection. So you LTE data plan will not be overwhelmed. 


Open Source

The CrossWire Bible Society is an organization with the purpose to sponsor and provide a place for engineers and others to come and collaborate on free, open-source projects aimed at furthering the Kingdom of our God. We are also a resource pool to other Bible societies and Christian organizations that can't afford-- or don't feel it's their place-- to maintain a quality programming staff in house. We provide them with a number of tools that assist them with reaching their domain with Christ.

The heart of most projects here at CrossWire use a common technology called The SWORD Project.

  • A cross-platform textual publishing and research engine with bindings for most modern programming languages.
  • A huge and rapidly growing electronic library of Bibles, commentaries, devotional and general books, maps and much more, in many different languages.
  • A community where volunteers and developers can meet and assist each other in creating great Bible software.
  • A place where publishers will find tools to easily make available their works on a vast array of devices and operating systems.

Pocket Sword

— a Bible reading and study app for iDevices

— by CrossWire Bible Society

It is more than just Bible study. It provides for language studies,

learning foreign languages, learning grammar of your language.

Runs on desktops (Linux, Windows, Mac), and on smartphones.

There is a Java version as well.

Eloquent (formerly known as MacSword) brings the power and versatility of The SWORD Project to users of OS X, along with a beautiful Aqua interface.

PocketSword is a SWORD frontend for the iPhone and iPod Touch. It requires OS 3.0 or later and is now available in the AppStore

Xiphos (formerly known as GnomeSword), runs on Linux, Windows (Windows 2000 upwards), Solaris and all BSDs. Xiphos is a mature programme with all relevant features. Unique for Xiphos is its fully integrated and versatile ability to create your own commentaries, journals, and other content. Xiphos is translated into (currently) 11 languages, including Hebrew, Farsi, and German. 

March 16, 2015 Meeting Notes

posted Mar 16, 2015, 9:35 PM by Robert Brown   [ updated Mar 16, 2015, 9:44 PM ]



Google Safe Browsing System Updated 

CIA attempts at breaking Apple Security 

Discussion:  “does not seem to have been deployed”

Update Flash (yes, again)

FREAK Vulnerability Did Affect Windows

Windows Update Cautions - Sequence is Crucial this time

More (Update) on Superfish - Government Certificates not an issue AFAIK, Superfish is an issue

“… it took about 3 hours to reverse engineer the Lenovo/Superfish certificate and crack the password. In this blog post, I described how I used that certificate in order to pwn victims using a rogue WiFi hotspot. This took me also about three hours.” 

Brian Krebs on Apple Pay (Bank/Credit Card) Scams

— stolen credit cards are used by thieves on their own Apple Pay 

— not really an Apple Pay problem


Apple Updates for FREAK Vulnerability & More (Note, this is iOS, Mac OS & Apple TV)

General News:

Apple Announcement:  MacBook  Watch Research Kit

And, more Research Kit  HBO on Apple TV

Apple Annual Shareholders Meeting - Tweets from Fortune  Article from Apple Insider

Tim:  Tell us how/where we can do better

Steve Jobs Video from Next Days

Petition for Dropbox NOT to Drop Support for 10.4 & 10.5 (Tiger & Leopard)

Apple Invited to Join Dow Jones Average

Mail List Issues - AOL, Yahoo, etc.

iTunes ‘Outage’ 3/11/15 (US & Europe)

Presentation by Scott Jenson of Google — Open Source

The Internet of Things 

Smart Devices

Withings scale, Nest thermostat, …

Previously at Frog Designs.

You do not want separate apps for each smart device.

How about URL’s instead?

The growth of smart devices will be exponential, and getting more apps is not going to scale with that growth.

Furthermore, apps are being drown in the number of App releases.

40% of apps on the Apple store have NEVER been downloaded!

The goal is to get the controls of smart devices to scale like the web scaled.

The smart device sends a bluetooth code to bring up its web page. It is a discovery service for the devices in your immediate environment.

It has to be decentralized. 

Discover - Rank - Interact

It is not a Google product — it is a web product.

Bluetooth LE sends out an advertising packet, once each second.

The packet is a URL, e.g. “” from a coke machine.

A phone comes by and checks what is nearby, e.g. the coke machine.

These physical devices create the physical web.

Bus stops, vending machines, restaurants, groceries, home controls, etc.

But it only shows you things when you ask to be shown.

Users can opt-in to letting the system gather anon. data.

Your past behavior will be used to rank the most interesting things for you.

It is like QR codes, only broadcast over Bluetooth LE.

The web site, e.g., can send instructions to a vending machine, that you have paid with ApplePay, and you want a Diet Coke.

simple web: smart device sends you a link to the web 

triangular web: the web server tells the smart device what you want.

direct connect: your phone talks to the web server, and also to the smart device.

The project is on Github, with more than 3400 developers watching, participating.

physical web is available on the Apple iOS store.


1. Odd email problem with Apple Mail on my computer, Mavericks.

Outbox items are not being sent.

This might be a known problem with Gmail, where the SMTP server keeps dropping off the list.

Maybe check the Taking Control of Apple Mail book.

Some big providers, e.g. Comcast, are not letting mail work except on their network.

2. My old printer is not working under Yosemite. It is a Canon. 

Apple Support may be able to help — call the support number.

Try generic printer driver.

Keep checking the Canon site for new driver downloads.

3. When I use Siri to initiate a phone call over a bluetooth headset, it drops the headset just as the call starts.

Check your preferences, and make sure you preference is to use the headset for phone calls.

4. QEMU - running Windows programs on Mac.

Anyone using.

5. Best practices for Time Machine backup: 

external drive direct connect is the best, using Thunderbolt.

WiFi network drives allow multiple machine backups.

6. Under Yosemite, can I have an app start up automatically?

    Yes -- under Users account, set up in login items. 

    and also by using contextual menu on a Dock icon.

7.  How do I uninstall MacKeeper?

    Go to for instructions.

    Also try "App Delete" or "App Zapper".

    Do not trust the MacKeeper provided uninstaller.

February 23, 2015 Meeting Notes

posted Mar 12, 2015, 9:24 AM by Robert Brown




  • Yosemite to 10.10.2 
  • iOS to 8.1.3 
  • iTunes to 12.1 
  • Apple TV update 

General News: 




  • Apple Investing in European Data Centers 
  • Apple Building CA Solar Farm 
  • Tim Cook speaks at Cybersecurity Summit 
  • Pilots use iPads to crash land a plane after navigation system failure  


  • Apple Results, Awesome:  First Link, Second Link 
  • Tim Cook Speaks at Goldman Sachs Conference 
  • Goldman ups Apple Price Target to $145 
  • Apple Includes Minority Banks in Bond offering 


Presentation Highlights

    Pages by Michael Cohen

    Author of Take Control of Pages

    Why was Pages rewritten by Apple?

    — because the market is now been led by iDevices as opposed to desktops or laptops.

    — Apple wishes to have continuity of appearance and operation between iOS and Mac OS X.

Part of the cross compatibility is that Pages will recognize when a given device does not have a font which is used in a document, make the appropriate substitution, but without changing the original font assignment.

Alas, we lost newspaper style column flows, mail merge, and other utilities. 

So many people are complaining that “Pages was dumbed down”, but this is unfair. Pages remains a sophisticated document authoring tool. The new Pages is not stupid.


1. Bluetooth keypad (LMP) is not communicating with my Mac. The connection was lost suddenly. The battery is fine. It will not pair with the computer.

— try leaving the battery out for more than 24 hours, to clear out residue data in the memory. 

— in the Mac, tell it to forget the given bluetooth device, and discover it fresh.

2. If I have 5 GB in Dropbox, when I install Dropbox on my iOS device, will it take up 5 GB? Can I selectively sync only certain folders of the Dropbox?

— yes, you can choose, on each device individually, which folders will be sync’ed.

— we will investigate.

SVMUG meeting January 26, 2015

posted Jan 26, 2015, 9:28 PM by Robert Brown

NEWS January 26, 2015



Google’s Project Zero publicizes zero-day vulnerabilities - Mac OSX

Update for Critical Security ‘Pushed’


Logic Pro

Dropbox stopping support 10.5 & Older

General News:

BBC Panorama Show Accuses Apple re Workers

Apple Responds to BBC Critical Show on Apple in China

Apple Quality ‘Conversation’

Linkbait or Reality? 

Apple buys online music analytics company

Market Share update - Apple does well

Apple Pay doing well

Apple Reports Compensation for Execs

Retail Stores Opening in China

Mac mini Gets 2TB option back

iPhone Withdrawal Harms Performance

After CES Analyst Speculates on Apple TV & Robots

iOS 8 Adoption Nears 70%

Spaceship Campus Progressing

Info re BackBlaze Hard Drive Stats


Analysts make guesses re Apple Q1 results 

Apple Earnings Results, Conf Call tomorrow 1/27


Monster Sues Apple’s Beats

Apple and Ericsson Fight over Patents

Apple Wins iTunes Antitrust Case & Jobs Testimony rRemains Confidential


Apple launching Stylus w/larger iPad?

Apple’s chips ready for Low-end laptops

More on ARM chips in Macs



FEB 23, 2015


Dave Peck on VPN software and use.

What is CloaK?

Keeps you safe when you are connected to WiFi networks in the wild.

It is a easy to use VPN.

Three freelancing software developers put it together.

They wanted to make a VPN that was Mac-like and Mac-friendly

Why should you care?

Unprotected WiFi can be dangerous.

For example, Firesheep is a FireFox plug-in that allows snooping of communications on a WiFi network. 

It would even automatically log in to Facebook as some one else when a log-in was detected on the network.

Cloak provides value where HTTPS is not in use.

Cloak prevents passive snooping. 

What is a VPN?

virtual private network

Every byte will be encrypted before it is sent from the local client.

A special VPN server receives the encrypted data, unwraps it,

and forwards it alone.

How is this different from TOR?

How does it affect workplace snooping?

What about other platforms?

We love our Apple devices, which is why when we first built Cloak we built it for Macs, iPhones, and iPads. But we haven't forgotten Android, Windows, and Windows Phone — and perhaps someday in the future, we'll have more to say about them!

How many Cloak accounts do I need?

One! You can use one Cloak account with as many devices (Macs, iPhones, iPads, etc.) as you like.

(We only ask that you keep it to one account per person.)

Do you support Yosemite?

Of course. We're all about Apple.

Do you support iOS 8?

You betcha.

Try for free for 30 days.

$9.99 per month for unlimited service.

$2.99 for 5 GB per month.

Given how much of our daily life and business is conducted online, the question isn’t really if you can afford to sign up for Cloak — it’s if you can afford not to.

Dan Moren, Macworld

SSL is pretty much broken - so people should be using TLS.

POODLE was an attack that caused a client browser to downgrade from SSL to TLS.

 The terms SSL and TLS are often used interchangeably or in conjunction with each other (TLS/SSL), but one is in fact the predecessor of the other — SSL 3.0 served as the basis for TLS 1.0 which, as a result, is sometimes referred to as SSL 3.1.

It used to be believed that TLS v1.0 was marginally more secure than SSL v3.0, its predecessor.  However, SSL v3.0 is getting very old and recent developments, such as the POODLE vulnerability have shown that SSL v3.0 is now completely insecure (especially for web sites using it).  Even before the POODLE was set loose, the US Government had already mandated that SSL v3 not be used for sensitive government communications or for HIPAA-compliant communications. If that was not enough … POODLE certainly was.  In fact, as a result of POODLE, SSL v3 is being disabled on web sites all over the world and for many other services as well.

SSL v3.0 is effectively “dead” as a useful security protocol.  Places that still allow its use for web hosting as placing their “secure web sites” at risk; Organizations that allow SSL v3 use to persist for other protocols (e.g. IMAP) should take steps to remove that support at the soonest software update maintenance window.

Subsequent versions of TLS — v1.1 and v1.2 are significantly more secure and fix many vulnerabilities present in SSL v3.0 and TLS v1.0.  For example, the BEAST attack that can completely break web sites running on older SSL v3.0 and TLS v1.0 protocols. The newer TLS versions, if properly configured, prevent the BEAST and other attack vectors and provide many stronger ciphers and encryption methods.

Cloak includes “Overcload”, which makes sure that when you change networks, no communication is made until the security has been established.

Cloak provides security for the immediate network, but not for the global network — The NSA can still get you.

Open Source Corner

Font Awesome

Treat icons on a web page like styled text.

The iconic font and CSS toolkit

Font Awesome gives you scalable vector icons that can instantly be customized 

— size, color, drop shadow, and anything that can be done with the power of CSS.

Free, as in Speech

Font Awesome is completely free for commercial use. Check out the license.

 One Font, 519 Icons

In a single collection, Font Awesome is a pictographic language of web-related actions.

Q & A

1. Got a new MacBook Pro. Having trouble connecting Firewire 400 drives via an adapter. Does not work with USB either. The drive is a 5.25 with its own power supply. The drive works fine with older computers under Firewire 400.

We suspect the adapter is not good, but as USB is not working, something deeper might be going on. 

Perhaps the bridge chips in the cables?

2. Any experiences with upgrading from Mavericks to Yosemite?

Most experiences seem to be good.

Read “Taking Control of Upgrading to Yosemite”

3. How to use AirDrop on a Mac?

4. Does iPhoto work on Yosemite?

Yes. But bear in mind the Photos will replace iPhoto and Aperture.

5. Demo Handoff.

6.  Recurring directory corruption on internal hard disk.

Very intricate problem — we can only recommend AppleCare. Something is actively damaging your disk — perhaps a third party hardware, like one of the external drives. 

1-10 of 31