Wednesday, December 20, 2017–Doors open at 5:30pm, pizza and drinks served at 6pm
DUNHAM PUBLIC LIBRARY, 76 MAIN ST., WHITESBORO, NY 13492
It’s the last gathering of the UAUG for 2017! Please join us for a fun evening of food, fellowship and PRIZES! Pizza, soda/water, dishes and utensils will be provided, please bring a dish to share (dessert, cookies, salad, veggies, crackers, fruit, bread, etc.).
- Chinese Auction (bring cash for tickets!)
- Door Prizes
- Grand Prize Drawing! ($300 – need not be present to win)
- Election of Officers for 2018
We hope to see you all there!
April 23, 2013
At the onset of this evening’s presentation, Dan took a few minutes, to reiterate the new Christmas party “member prize” rules. He also explained that due to a death in the family, Al Fasoldt was unable to attend as originally scheduled, thus necessitating a change in tonight’s program. Instead, tonight’s meeting featured Peter discussing password security applications. Specifically, he demonstrated 1Password.
Peter then began by showing Ellen Degeneres in a humorous, but thought-provoking, YouTube video on password organization. He showed a list of the 25 most popular passwords that are commonly used. This list is available on the internet. He discussed how devious password crackers use computer clusters which are able to guess 350 billion combinations per second.
A handout entitled “Password Dos and Don’ts” was distributed.
Do’s: (from us.norton.com/dos-donts-passwords/article)
•Do use a combination of uppercase and lowercase letters, symbols and numbers. Peter explained that crackers are after where the password is stored on your device.
•Do make sure your passwords are at least eight characters long. The more characters the more difficult they are to guess. However, according to MacWorld: “14 is the new 8”.
•Do try to make passwords as meaningless and random as possible.
•Do create different passwords for each account.
• Do change your passwords regularly.
•Don’t use names or numbers associated with you, such as a birth date, nickname or names of close family members.
•Don’t use your user name or actual name in any form as a password.
•Don’t use a solitary word in any language. Hackers have dictionary-based tools to crack these types.
•Don’t use simple passwords like 123456, or the word password.
•Avoid writing passwords down–if you must, keep them safe, and never give them out to anyone, in writing or otherwise
•Don’t answer yes when prompted to save your password to a particular computer’s browser.
In order to meet the challenge of creating unique, random passwords Peter discussed some systems that have been devised to create and remember long passwords. He illustrated several of these on his handout.
Another video, from the writers of Time magazine, suggested ways to create passwords. Peter commented that any system you create isn’t random. “Through 20 years of effort, we’ve successfully trained everyone to use passwords that are hard for humans to remember, but easy for computers to guess,” was the last statement on his handout. In the end, passwords made of at least 14 randomly generated characters using letters, numbers, special characters and varied capitalization are the strongest passwords.
Peter then listed some suggestions for programs that might be used to create longer passwords. These included:
LastPass, DataVault RoboForm, Wallet, Splash IDSafe, mSecure, 1Password, and eWallet.
Before discussing these Peter mentioned that Macs have the Keychain Access application. It is located under Applications > Utilities and it stores passwords for email, websites, servers, network shares, WiFi networks, and encrypted disk images etc.
It includes a difficult-to-access Password helper: Keychain Access > [click + to add password and open the helper window]
Peter mentioned that there is an article in the March 2013 Macworld magazine about keychains. It recommends changing the Login Keychain password. Changing it to something other than your user account password will increase the security of your Mac. Change the login keychain password in the Keychain Access Keychain Viewer. Right-click on the keychain named login and select “Change password for keychain ‘login.'”
Peter then explained that he has been using 1Password by AgileBits.com for a couple of years now to remember and generate secure passwords. Version 4 is available for iOS 6 and version 3 is available for Mac. Using Dropbox, you can sync the password data file between your iPhone, iPad, iPod Touch and Mac. There is a fully functional 30 day trial version after purchase ($49.99) and a 25% discount for user group members.
Peter opened his 1Password demo by stating that the hardest thing to do is to free one’s mind from thinking that it must remember all the different passwords one has.
Peter then demonstrated how to use 1Password to create a password and remember account information as he created an account on FitDay.com. You should create a strong password for your “master password”. This is the only password you must remember. Then he asked 1Password to generate a password for this site, and then copied and pasted this password into the site so it could be saved. When you start up the 1Password App, it gives you a list of all the sites for which you have saved passwords. He then accessed the FitDay.com account, copied the password, and pasted it into the login form. All of these passwords are sitting on your computer in an encrypted file. There are plug-ins to help you sign up, login and create passwords for Safari, Firefox, and Google Chrome.
Dan mentioned that in the UAUGtalk website under member deals > Apple User group deals, the special 25% deal for AgileBit is mentioned in the April 15 User Group Bulletin.
AgileBit License for 1Password- Paul F.
50-50: Dan H.
May 2 – Dave Marra- MugOne Oneonta- Hartwick College -iWork for Mac and iPad presentation
Meetings will continue to begin at 6 even though the Dunham Library custodian has returned.
The meeting was adjourned at 8:15.
March 26, 2013
The first order of business at tonight’s meeting, was a discussion of meeting times and place. Due to staffing issues, Dunham Library is requiring us to vacate the building at 8 p.m. Peter queried members as to their preferences. Since we have already paid for the use of the Community Room, should we continue meeting at Dunham, start at 6 p.m. and end at 8, or investigate meeting at the New Hartford Library if the dates are available? It was decided to continue at Dunham at the earlier time.
He next explained our decision to institute in May a new policy of issuing a “Member Prize” ticket to all UAUG members at the Christmas Party regardless of their attendance at this event. This prize will be determined at a later date and have a minimum value of $500. Additional tickets would be issued for attending meetings, making a presentation, and/or sponsoring a new member.
Al Fasoldt will be making a presentation at the April 23rd meeting. Members should check their email in case there needs to be a change with the new time format.
Dan then continued with last month’s topic: iPhoto and Photo Stream. He began by asking what questions/concerns members have with iPhoto and distributed a handout entitled “More with iPhoto – Agenda. He then went on to explain that iPhoto 11 is the current version we use. Things we do with it include import, organize, edit, print. Dan then shared a brief video. He reiterated that PhotoStream instantly downloads on all your devices on iCloud.He explained how it works with no syncing, email attachments or file transfers.
If you open iPhoto and hold option key you will get a window asking which library you would like to use. Steps to get started: Connect camera or memory card, drag photos into iPhoto, choose File-Import to Library. If you take a picture with your iPhone or pad, turn on Location Services so the device will automatically know where you took the pic. Dan then explained each of the icons at the bottom of the iPhoto screen. He continued to build a new library and drag pictures from Photo Stream. He selected various photos and copied them to this library and created an event. He showed how to use faces to identify and find photos that a particular person is in.
Places- The window shows where a photo was taken and what type of device it was taken with. You can set up key words and set up a shortcut to use it. Keywords, events, faces, places are ways to identify your libraries. Dan mentioned that you need to decide how you want to use PhotoStream and how it will impact the storage on your device.
Dan went through the preferences for iPhoto including General, Appearance, Sharing PhotoStream, Accounts, and Advanced. He suggested using mail instead of iphoto for sending someone a picture.
Peter cautioned to never import one iPhoto Library into another iPhoto Library. Options: buy Aperture which has the ability to merge two iPhoto libraries, or iPhoto Manager which also has a merge feature, or create a folder on the desktop to export your photos temporarily so you can import them into the iPhoto library where you are consolidating your photos. You will lose some meta data, but all of your photos will be in one place. Dan demonstrated this last method.
If you are updating to a new version of iPhoto, back up first. If you are using Faces, etc. back up also.
$10 Kiki H-$10 itunes card:
50-50: $6- Paul F
The meeting was adjourned at 8 P.M.
Welcome to the new UAUG.org. Still working on the design and content. Comments on what you’d like to see on this website are welcome, although, at the moment, content is limited to information about what we do and when/where we meet. Reports from previous meetings are also planned. UAUG members who are interested in contributing content are requested to contact the moderator with their proposal. Comments on posts are moderated as free time allows. You might receive your answer privately or posted online here, at the moderator’s discretion. Members, don’t forget you can log in and post questions on UAUGTalk.org, your direct link to other UAUG members and their knowledge.