Author Archives: Sally Childress

internetsafetyIt was long thought that Macs were impervious to malware, viruses, slowdowns, and other typical "PC" problems.  However, due to the increasing popularity of of the Mac operating system, hackers have turned their sights to the once immune platform.

"Attackers dearly care more about Macs now But we need to keep our perspective: There's still far less malware aimed at Macs than at, say, Android phones. Nevertheless, Flashback is a significant development. We'll see more malware on Macs, but as long as we all take precautions and stay vigilant, the attacks will be infrequent events rather than the continuous onslaught of epidemics that some observers are predicting. "  ~Mogull, Rich. "The Flashback Trojan horse explained: we've entered a new era in Mac security, but there's no need to panic." Macworld July 2012

Macs are based on the Unix operating system, which is much harder to hack.  However, it doesn't mean they are immune.  The recent "shellshock" bug proved that - a vulnerability that would potentially allow a hacker to gain control of the victim's computer.  These things and more are reason enough to put a little bit of protection on your Mac.  There have also been numerous cross-platform malware attacks lately, ushering in a new era of Mac security.  It's all about prevention, though, so following proper protocol to prevent viruses is key for all computers.

Another thing that Macs are no longer immune to is file clutter and other problems.  Recently there have been some software programs that have been created to help Mac users better manage their computers.

Mackeeper is one such program, and you can easily and quickly install it to help optimize your system.  There has been a bit of controversy over Mackeeper but it's a safe program.  The thing is, you don't need it if you don't need it.  If you're having problems with your Mac, however, it might be a great alternative to that annoying appointment at the Genius Bar.

So what can you do to keep yourself safe?  Follow the standard operating procedure of all computers.  Don't download unknown attachments, only download and install software from VERY trusted sources (a random downloads website is not a trusted source), don't browse in internet bad neighborhoods, and back up your important data on the regular.  Don't download lots of torrents or other file sharing types.

And that's about it.  It's really not that hard, but sometimes viruses slip through, and in the case of the shellshock vulnerability it doesn't even seem that you have to have downloaded something weird to get attacked.

 

barcodeBar codes are quite taken advantage of these days, but the truth is that they've helped us grow our businesses by leaps and bounds.  Not only businesses, but public records, libraries, and more all use bar codes in order to quickly sort and catalog all sorts of information.

Let's take a look back at the early days of the bar code, and appreciate how far we have come in terms of technology.

This article is quite amusing, in that it treats bar codes as some new alien technology.  However it should all be common knowledge nowadays.

Multifield Code

The advantage is that several items of information (P.O. box number, account number, document type and so on) can be incorporated in a single bar code. The catch is that someone has to tell the computer something about the document in order to get the label printed, so keystrokes cannot be totally eliminated.

While both labeling methods involve some additional effort and cost, the potential gains in document control are significant. Presorting is minimized or eliminated. More important, any document, once bar-coded, can be tracked easily from its arrival in the mail room to its final disposition.

No longer can documents get lost in the system. Document tracking pinpoints their location immediately, and even identifies documents delayed in processing.

The codes that make all this possible are nothing more than precise patterns of wide and narrow dark bars and light spaces that provide a machine-readable interpretation of an eye-readable value.

Numerous symbologies have come into use as bar code technology evolved, but today four are more widely used than the rest: The uniform product code (UPC), Codabar, interleaved two of five, and Code 39 (three of nine).

While each has advantages for certain applications, Code 39 is most commonly used for document applications because of its alphanumeric content and unlimited character length.

All symbologies include start and stop characters for scanning from either direction, and most have self-checking features that verify the accuracy of their interpretation.

Bar codes can be quite arbitrary. While other technologies such as optical character recognition (OCR) might "guess" at an imperfect character, bar code scanning will reflect it as a "no read."

"First try" reading depends heavily on the quality of the printed code. Contrast ratio, narrow and wide element width, code density, height to width ratio and carbon content all matter. Because of the self-checking feature, the misread rate is low. One government study set it at fewer than one in 3 million characters.

Devices for reading bar codes generally can be defined as either fixed-beam or moving-beam scanners. In fixed-beam devices such as wands or photo-diode scanners, a focused light beam passes over the bar code or vice versa, and the modulation of reflected light from the dark bars and light spaces generates a signal.