2 Finder Alternatives For OS X

The Norton Commander

Where Is the Norton Commander When You Need It? In the mid 1980’s, command-based or Orthodox File Mangers were introduced. Simply, these file managers are a text user interface, on top of DOS. With this new software, command line strings could be replaced by a few key strokes, meaning a quantum leap in user productivity.… Continue reading 2 Finder Alternatives For OS X

Hotlinking – Content And Bandwidth Theft

Who Knew??? Several weeks ago, while digitally “thumbing” through the available apps on my content delivery network (to learn more about CDN’s, click HERE) CloudFlare, I enabled all the elements of an app entitled ScrapeShield. CloudFlare describes the app as “…a free app…that protects your site’s content, and allows you to monitor and track misuse.… Continue reading Hotlinking – Content And Bandwidth Theft

Behringer Pro Mixer VMX200USB – Not Just For DJs

Do I Really Need An Audio Mixer? Several years ago, I decided to embark on the task of digitizing songs from my vinyl record collection. With the exception of a phono pre-amplifier, I had everything I needed to accomplish the task. After looking for phono pre-amps online, I could not decide on a specific model… Continue reading Behringer Pro Mixer VMX200USB – Not Just For DJs

Murus: OS X IceFloor Alternative

What Is Murus? For some time now, IceFloor is the graphic user interface I have used to set up the PF firewalls on both of my Macs (Learn more about IceFloor by clicking HERE). Now that OS X Yosemite has arrived, IceFloor can still be used, but the current version is feature delimited. Though IceFloor… Continue reading Murus: OS X IceFloor Alternative

Mac OS X:Clean Install – The Easy Way

Who knew???

Introduction I installed Yosemite (10.10), on my 2008 iMac. I loved the look of this new operating system, and its features; however, after the install, my iMac was running pathetically slow. I spent hours trying to debug the thing, and could not find a single cause. I knew that over a number of years I… Continue reading Mac OS X:Clean Install – The Easy Way

Social Networks and Social Engineered Cyber Crimes

Where did my identity go?

Currently, one of the fastest growing cyber crimes on the internet is the harvesting of bits and pieces of user information placed on social networks, and using that information against the user by way of identity theft.  These types of cyber crimes refer to the psychological manipulation of people into performing actions or divulging confidential information… Continue reading Social Networks and Social Engineered Cyber Crimes

Cybersecurity 101 – NOVA Labs | PBS.org

Here is a very well done 3 minute 38 second video that explains Cybersecurity on the internet.  The video is from NOVA Labs | PBS.org. At NOVA’s website, in their Cybersecurity Lab, you can play a game where you are one of the people, protecting a company that is the target of increasingly sophisticated cyber attacks.… Continue reading Cybersecurity 101 – NOVA Labs | PBS.org

The Behringer UCA202 (UCA222) USB Audio Interface On Linux

Behringer UCA222

My kingdom for a horse! For several years, I used a Mac Pro “Cheese-grater”, with two Power PC G5 processors, as my home theater computer. The video was fine (as long as I ran it at 720P), and the audio was very good with fiber optic “out” . Its aging Mac OS X worked well… Continue reading The Behringer UCA202 (UCA222) USB Audio Interface On Linux

IceFloor: Harden Your Mac OS X Firewall

Figure 1.

Once upon a time, I believed that computers behind the router/firewall on a home network were pretty safe from hacking. Yes, I knew that I could download nasty bits of software from the Internet, but as far as being hacked by access from “my” network, it just wasn’t likely. I didn’t use software firewalls on… Continue reading IceFloor: Harden Your Mac OS X Firewall

Port Forwarding and Small Network Security

I Hate Bots

Port forwarding is found in both business enterprise and small-business computer networks. As home computer networks are becoming both more common and complex, port forwarding can be found here as well. While enterprise level networks use highly advanced routers and hardware firewalls for protection, the processes of secure shells, tunneling, and port forwarding can function with a… Continue reading Port Forwarding and Small Network Security