April 17, 2018 brianradio2016

Short, sweet and useful — here are 10 helpful Mac Finder tips you can use to get the most from your Mac.

Open in work mode

Do you keep all your work in a specific folder? If so, do you get a little frustrated when Finder opens in default view? Change this in Finder>Preferences in the General pane, where you should set New Finder windows show to the folder you need to explore most often.

Add extra Finder tools

I think most Mac users know this, but in case you didn’t: Control-Click the Finder Title bar and select Customize Toolbar in the contextual menu that appears. Now you can add (and remove) a bunch of options from the Finder toolbar.  (I like to add a Path button to help me manage my way through my forests of files.)

More ways to find a file

Speaking of adding a Path button to help navigate through your file forest, here are a few more ways to find where a file is situated on your Mac:

April 16, 2018 brianradio2016


April 16, 2018 brianradio2016

One of China’s top social networking sites announced Monday that it will no longer be censoring content related to gay issues after the plan triggered a loud public outcry. Weibo.com was flooded over the weekend with the hashtags “#I’mGay” and “#I’mGayNotaPervert” after the Twitter-like platform said that cartoons and…

April 16, 2018 brianradio2016

With so much focus on staying productive, it may surprise you to realize just how many things you can do with a locked iPhone. What can you do and how can you switch these features off?

Wake it up

The Raise to Wake feature available since iPhone 6S/SE means your iPhone can tell when you pick it up and will wake the display up automatically so you need not do so. Left on by default, you can disable this feature in Settings>Display & Brightness where you toggle Raise to Wake to off.

Make a call, send a message, and more

You can call people from a locked iPhone. Just ask Siri to call a person in your contact book. You can also send Messages using the locked device. Just ask Siri to send a Message and name someone in the device’s Contacts book. To stop this, set Allow Siri When Locked to off in Settings>Siri & Search.

You can use Siri

If enabled, Siri will also tell you about your agenda, create meetings and reminders, and send text messages to contacts while your device is locked. It will also let you see its top result recommendations when you enter a search term on the lockscreen, though you will need to unlock the screen to get to those results. If you don’t want Siri to be accessible from the lockscreen, you should toggle Allow Siri When Locked to off in Settings>Siri & Search.

April 16, 2018 brianradio2016

If you’re currently using an older iPhone or iPad, the upcoming iOS 12 might bring with it bad news and a trip to the Apple Store to buy new stuff.

what’s hot on zdnet

Currently, iOS 11 supports the following devices.


  • iPhone X
  • iPhone 8/8 Plus
  • iPhone 7/7 Plus
  • iPhone 6s/6s Plus
  • iPhone 6/6 Plus
  • iPhone SE
  • iPhone 5s


  • 12.9‑inch iPad Pro 2nd generation
  • 12.9‑inch iPad Pro 1st generation
  • 10.5‑inch iPad Pro
  • 9.7‑inch iPad Pro
  • iPad Air 2
  • iPad Air
  • iPad 6th generation
  • iPad 5th generation
  • iPad mini 4
  • iPad mini 3
  • iPad mini 2

iPod touch

  • iPod touch 6th generation

I fully expect the oldest iPhone and iPad devices to face the chop come iOS 12, which means compatibility being dropped for the iPhone 5s, iPad Air, and iPad mini 2. All three devices were released in 2013 and all three devices are pretty long in the tooth now.

I expect the 6th generation iPod touch to survive this time around. While pretty old — first released 2015 — Apple is still selling this device, so I expect it to have a few years of life in it yet.

Also: iPhone battery life bad after installing iOS11.3? Here’s what you can do

What about tvOS 12 and watchOS 5? Looking at the timeline, I expect all 4th generation Apple TV devices and later — which run tvOS 11 — will be all be upgradeable to tvOS 12, with no older devices being made obsolete this time around.

On the watchOS front, given how much of a performance hit watchOS 4 had on the 1st generation Apple Watch, I think that support for it will be dropped this year. So if you’re one of those people still using the original Apple Watch — and it’s not in a drawer somewhere gathering dust — then time is almost up for it.

See also:

April 16, 2018 brianradio2016

Microsoft’s ASP.Net Core has already become a popular way to build high-performance, modern web applications that can run on Windows, Linux, or MacOS. One way it supports high performance of course is caching. Although ASP.Net Core doesn’t have an in-built Cache object, it provides support for several different types of caching including in-memory caching, distributed caching, and response caching.

In previous articles I discussed how to use in-memory caching in ASP.Net Core and how to implement a distributed cache in ASP.Net Core. In this post, I will explain response caching and its benefits and then examine how we can work with the response caching middleware provided in ASP.Net Core.

Response caching explained

Response caching refers to the ability to cache web server responses using cache-related headers in the HTTP response objects. Such headers are used to specify how to cache the responses for either all requests or a few selected requests. Note that unlike output caching, response caching in ASP.Net Core doesn’t cache the responses in the memory of the web server.

Response caching in ASP.Net Core is actually a better and extensible form of output caching. It is used to inform the web browser to cache content by specifying cache-related headers on HTTP responses. This can significantly reduce the number of requests a client makes to the web server, and significantly reduce latency, as subsequent requests can be served from the client’s cache. It should be noted that response caching uses memory to cache the data by default, but you can even configure custom storage providers if need be.

April 16, 2018 brianradio2016

The Australian government has sent cybersecurity representatives to the United States this week, hoping to strengthen the cyber alliance between both countries and parade local cyber talent.

Minister for Law Enforcement and Cyber Security Angus Taylor, alongside Commonwealth Cyber Coordinator Alastair MacGibbon and Australian Federal Police Assistant Commissioner Neil Gaughan, are expected to this week meet with US government counterparts and senior officials in Washington, including the Department of Homeland Security and the Federal Bureau of Investigation.

The trio will also meet with representatives from PayPal, Twitter, Apple, and Google to “encourage deeper cooperation with governments to address challenges faced by law enforcement”.

“It is clear that governments cannot succeed alone and must work with the private sector to drive innovation and protect our digital borders,” Taylor said in a statement.

“Our engagement with the US government and global technology companies will advance our priority to develop a coordinated national cyber defence policy in 2018.

“Cyber defence capabilities are strengthened with joint cyber activities and data sharing not only between governments, but also between governments and industry, to stop emerging cyber threats.”

Missing from the list of tech giants is Facebook, which is currently under global investigation following revelations information on up to 87 million users, mostly from the US, was “improperly shared” with Cambridge Analytica.

Taylor praised the passage of the Clarifying Lawful Overseas Use of Data Act by the United States Congress last week, labelling it a significant step in international law enforcement cooperation in the digital age.

“The CLOUD Act will greatly improve the efficiency of law enforcement’s access to the information they need to do their job and strengthen protections of people’s data, no matter where their data is held,” Taylor said.

“Timely access to electronic data held by communications service providers is an essential component of government efforts to protect public safety and combat serious crime, including terrorism, child sex offences, and organised crime.”

The minister believes such efforts are impeded when access to “important data held on servers overseas” is slowed down by “cumbersome processes not suited for fast-advancing communication environments”. He said it also significantly delays the investigation and prosecution of serious crimes.

The CLOUD Act creates a framework for law enforcement agencies to directly access under lawful warrant data across borders. It allows bilateral agreements between the US and other countries, touted as enabling more efficient lawful access to relevant data.

The Australian government last year met with representatives from Facebook, with the social media giant schooling the politicians on cybersecurity, in particular the current threat environment. At the time, the expectation was that politicians would also learn how to enhance their security on the social network.

The meeting follows the Australian government reigniting its push to access encrypted communications in February, with Minister for Home Affairs Peter Dutton labelling “ubiquitous encryption” a “significant obstacle” to terrorism investigations.

According to Dutton, more than 90 percent of counter-terrorism targets are using encryption for communications, including for attack planning in Australia.

“Decryption takes time, a precious commodity when threats may materialise in a matter of days or even hours,” he added. “Law enforcement access to encrypted communications should be on the same basis as telephone and other intercepts, in which companies provide vital and willing assistance in response to court orders.”

Dutton believes companies “ought to be concerned” with the reputational harm that comes from terrorists and criminals using their encryption and social media platforms for illicit ends.

Australian Prime Minister Malcolm Turnbull, along with his then Attorney-General George Brandis, announced plans in July to introduce legislation that would force internet companies to assist law enforcement in decrypting messages sent with end-to-end encryption.

Questioning if the proposed legislation was technically possible, ZDNet asked the prime minister if the laws of mathematics would trump the laws of Australia.

“The laws of Australia prevail in Australia, I can assure you of that,” Turnbull told ZDNet. “The laws of mathematics are very commendable, but the only law that applies in Australia is the law of Australia.”

Dutton said the Coalition still intends to introduce legislation that would force companies to bend to the government’s will.

“The government is willing to work with these firms, but we will also introduce legislation to ensure companies providing communications services and devices in Australia have an obligation to assist agencies with decryption,” he said. “And as a society, we should hold these companies responsible when their service is used to plan or facilitate unlawful activity.”

According to the minister, the companies involved — highlighted as ISPs, those “involved in apps”, and social media giants — have a social responsibility to ensure terrorist activity isn’t conducted on their respective platforms.

As part of his trip, Taylor will also lead a delegation of 65 Australian cybersecurity representatives from 45 companies to the RSA Cyber Security Conference in San Francisco.

The minister expects the initiative will prove Australia’s cybersecurity prowess and forge the country as an “international hub for cybersecurity innovation and investment”.

“A strong innovation culture, excellence in research and development, robust regulation, and supportive government policies all increase Australia’s appeal as a location to develop and test new cyber security solutions,” Minister for Trade, Tourism and Investment Steven Ciobo added.

“There are huge opportunities to grow Australia’s industry over the next decade and this visit to the US is designed to help unlock some of that potential.”

The delegation is organised by Austrade and the Australian Cyber Security Growth Network (AustCyber), and includes local companies that boast expertise across a range of areas, including quantum encryption, endpoint protection, and threat intelligence.

“With the growth of new technologies, including data analytics and Internet of Things, comes new cyber threats, so we need to ensure our technology and expertise to fight cybercrime is more sophisticated than ever before,” said Taylor, who last month told ZDNet the Australian government considers itself to be “world-leading” when it comes to cybersecurity.

The delegates will be joined by five cybersecurity startups currently in residency at Silicon Valley’s RocketSpace technology campus as part of the government’s AU$11 million startup landing pad initiative aimed at helping Australian entrepreneurs take their ideas to international markets.

A smaller delegation will also travel to Washington DC for defence industry meetings, the government said.


Australian government considers approach to cybersecurity ‘world-leading’

A prime minister that understands the seriousness of cybersecurity combined with cross-government and public-private information sharing initiatives has sent Australia to the fore, according to Minister for Law Enforcement and Cyber Security Angus Taylor.

Australian government still pushing decryption magic bullet

Seven months after Prime Minister Malcolm Turnbull told ZDNet the laws of Australia will trump the laws of mathematics, Minister for Home Affairs Peter Dutton has discussed looming legislation that would force companies to help the government access communications.

Australian pollies shut down calls for transparency over data use

In the wake of the Cambridge Analytica Facebook data misuse controversy, the Australian Greens had its motion for transparency over politician data use blocked in the Senate.

Warranted access to face-matching system thrown out by Home Affairs

The Department of Home Affairs said built-in privacy safeguards are sufficient, and that the Commonwealth Bill is not intended to regulate access to the services by other agencies.

Encrypting communication: Why it’s critical to do it well (TechRepublic)

It isn’t just enough to know that your devices and communications are encrypted. Competently configuring encryption with secure ciphers is vital to protecting data.

April 15, 2018 brianradio2016

An unreleased version of the iPhone X in gold color has leaked, thanks to a FCC filing. The Apple filing has the apparent gold iPhone X in photos from multiple angles, its included features, and dimensions.

The leaked iPhone photos also show gold sides, as opposed to silver on current iPhone X models. 9to5mac found:

The photo annotations do include reference to an ‘LCD display’, which is a little strange as the iPhone X uses an OLED panel. Other than that, it resembles an iPhone X in every way … in a never-before-seen color.

The Apple photos filed in September are now in public view thanks to a six month confidentially clause with the FCC. They hit the same day Apple released a red version of the iPhone 8, and a leaked memo showing fury from Apple execs over employee leaks.

Last year, Apple analyst Ming Chi-Kuo of KGI Securities anticipated a gold iPhone ahead of the September iPhone X release. However, the analyst noted at the time some production issues were occurring. The iPhone X, released in September, is currently available in silver and black offerings.

It wasn’t long ago we also heard more rumors about a gold iPhone from Apple. However, there’s no indication Apple is planning a gold iPhone release any time soon.

apple’s field trip