Introducing YippieMove '09. Easy email transfers. Now open for all destinations.

Many Mac owners are probably not aware that there is an excellent way to store passwords in OS X. In this how to guide, we will tell you everything about why you should use this feature, and how you can start taking advantage of it today.

We have written about how to secure your data with Apple OS X before. But what about your passwords? You could put them in an encrypted file, but there is a certain amount of effort involved with this. Every time you want a password you have to unlock your encrypted disk, and open some text file. Post-it With PasswordsChances are you will tire of that, and then you’d be back to writing your passwords on little post it notes. Or even worse: you’ll start choosing passwords that are easy to remember. This is one of the cardinal mistakes when trying to live securely. Memorized passwords are usually the worst passwords; simple, easy to guess and likely to be reused. How many people are reading your email right now because you choose your high school sweetheart’s name as your password?

There is a much better way to store passwords securely on the Mac: Keychain Access IconApple Keychain. The Keychain comes built in with your OS X operating system. If you are aware of it, you may think that its only function is to store your Safari and Apple Mail passwords. It can do much more than that.

Keychain encrypts all your passwords so that they can be stored securely, and yet the keychain is fast to use and organizes all your passwords to make them easy to find. Keychain is more secure than post-it notes, and much faster to access than a disorganized encrypted text file somewhere on your hard drive. Ultimately, Keychain can make your online experience much safer. You will be able to choose very tough passwords, and yet you will only need to memorize a single master password: your keychain password.

Here’s how to add any password for any account to your Keychain.

How to Add Any Password to the Keychain

  1. Open Apple Keychain. You can do this either by spotlighting for ‘keychain’, or by locating the ‘Access Keychain’ icon in your utilities folder.
  2. Selecting New Password Item… on the File menu.Hit Apple+N, or select ‘New Password Item’ from the File menu.
  3. Enter a good name for your password item. This will be the most important tag for finding your password item later, so make sure you pick something sensible. If the password is for a website, it’s often useful to put the address of the site in the name field.
  4. Enter your account name.
  5. Key Icon to Open the Generate Password SheetType in a password of your choice. You may click the key icon to the right of the Password field to open up Keychain’s built in password assistant.
  6. If you need a copy of your password immediately, select ‘Show Typing’ to reveal your password.

Yep, it’s that easy. Here’s an example:

Screenshot of the New Password Item sheet being filled out.

Now lets look at how to get the password back once you have stored it.

How to Get the Password You Need in Three Easy Steps

  1. Open Apple Keychain, by spotlighting for ‘keychain’ or by locating the ‘Access Keychain’ icon in your utilities folder.
  2. To search for a key, enter the Keychain Item Name or the Account name in the search box in the upper right corner of the program. When you can see your password in the list, just double click it.
  3. To see your password, check ‘Show Password.’ You will be asked for your keychain password. Unless you changed this master password, it will be the same as your login password.

Here’s the password we stored in our example:

Keychain displaying a stored password.

If you want to be able to access your passwords even faster, you can go into Keychain’s Preferences and check ‘Show Status in Menu Bar’. This adds a padlock in the Menu Bar. Clicking on the padlock reveals a menu that does not only allow you to reveal your keychain quickly, but also gives you a convenient ‘lock screen’ feature.

As you can see, getting to any one password is easy with Keychain. And even then, the passwords are protected and require your master password for display. You can have a unique password for every website you visit if you so wish, safe in the knowledge that if a password does come out, your other online activity will be unaffected.

Author: Tags: ,
Introducing YippieMove '09. Easy email transfers. Now open for all destinations.
Jan
02.

There are some major drawbacks with today’s laptops. Some of these bothers me a lot. Battery life is one of these things. I know there are some Sony laptops out there with 6 hours or so of battery life, but I only get about 2 on my PowerBook.
Weight is another thing that really bothers me. No matter if you’re a student or a business guy who carries around you laptop in you all day, you know how annoying the weight of a laptop is.
In this article I will explore the future of mobile computing the way I predict it. There are no scientific evidence behind my predictions, this is just my thoughts and ideas.

As I already mentioned, one major drawback with today’s portable computers is the battery-life. Why can’t they make computers with 24 hours of battery life? There are several reasons for this, one major reason is because of weight. I guess it would be no problem creating a laptop with today’s technology with 24 hours of battery life. Just hook up a couple of UPSes to you laptop and you’re set. However, It would probably not be very portable, since the weight of the laptop would turn it more into a huge server rather than a portable laptop. Let’s explore this for a while. What can we do to change this? As I see it, there are a couple ways we can achieve this (which can possible be combined for higher efficiency).

More efficient CPUs. Developing new CPUs with lower power usage is a given one that the CPU manufactures are constantly working on. However, I would also suggest that we lower the performance and focus more on batter-life. I’ll get back to why I think this later on in this article.

Switch away from traditional hard drives. One component in the computer that uses up quite a bit of power is the standard hard drive (which is a 2.5″ hard drive in most (all?) laptops). Do we really need to go for this approach? Why can’t we use a small flash-drives for hard-drive? Flash-drives are far more power-efficient than regular hard drives, and they are also far less sensitive to damage since they have no moving parts. In addition to this they can also access the data quicker. The downside is that the price per megabyte is really high for this kind of storage, but I’ll come back to how we will solve this later on.

Batteries with higher capacity. This is a field that is being researched a lot these days. Fuel-cell batteries seems to be something that will change the battery-world quite a bit of they now manage to make these stable and less dangerous. The question remains if they ever will be allowed on board a commercial jet in the post 9/11 era.

Now we’ve dealt with the internal part of the computer for a bit and how we can make those more power efficient, now let’s move on to the features that the laptop of feature will offer.

Touch-screen. I know, this is fairly common today, but I think we just seen the beginning of this trend. Let’s say you have a ultra-portable laptop with great battery life, wouldn’t this make a perfect e-book reader? You just flip and twist you monitor and you have a perfect book. You can read, high-light and make comments right there on the screen. No more carrying books around, you have it all in your laptop.

Wireless Gigabit network. In the post 802.11n era, I think we will start seeing country-wide networks that are freely available to the public. Google WiFi is just the start, Hight speed Internet connection will be taken for granted as we look at water and air today. Sure, there will be plenty of companies who will be lobbying against this (such as T-mobile etc), due to their own interests, but they will eventually realize that they’ve lost the war.

Biometric authorization. I’m still not sure which of the biometric methods that is the better one, but I’m sure we will see more of biometric authorization in the future.

Now lets sum up what I’ve written so far and think about it for a second. We now have an ultra-portable laptop with a slow CPU, a small hard drive, but a battery life of 24+ hours. However, we also have a Gigabit Internet connection available wherever we go, so what can we do with this? Well, a lot I’d say. Why do we need a big local hard drive if we always have a high speed Internet connection available? We don’t. Some of you might start to see where I’m going. Remember back in the days when we used those terminal-computers? Everything we ever needed was located on the server. I like that idea. Seriously, it’s brilliant. How many of you guys have ever dropped or lost your laptop? How much data was lost when that happened?

Thin-clients such as Citrix offers similar solutions today, but they tend to be very slow, and they only work (as far as I know) with desktop solutions (except for the client software).
If you have a hight speed Internet connection wherever you go, why do you ever need to store any data or do any calculations on you local computer?

Instead of booting up you laptop you operating system, you have a small loader on your flash-drive or in your BIOS that initiates the network card, create a secured tunnel to your company’s server and connects to a terminal window. In the terminal you have all you data accessible, always available from whichever of you terminals you connect. No more worries about taking backups of all your data on a regular basis, the server takes care of that for you.
In addition to that you don’t need to worry about sensitive data. Even if you loose your computer, all your data is located on the server anyway, and since they need you biometric authorization to access the data, the client is useless to them. Yey! no more laptop thefts.
Now when we’re connected to our super-fast server, why do we need a fast CPU on our laptop? We don’t, since all calculations will be done on the server anyways.

So when will this be possible you might wonder. It’s actually not that distance, everything except for the Gigabit WiFi would be possible with today’s technology.

Author:
Introducing YippieMove '09. Easy email transfers. Now open for all destinations.
Oct
14.
Comments Off
Comments
Category: Business, Featured

These last few days we have created a foundation for the work within our new company. Basically, we have configured and installed some internet related stuff. For now our ‘virtual base camp’ includes the following:

  1. Eventum for project tracking. This lets us keep track of what needs to be done, when it has to been done, and who’s doing what. We’re going to apply this to software development and project development alike. It’s like our virtual whiteboard.
  2. A Blogger account or two (or three) for this blog.
  3. A Google Sitemap to make sure we can start staking out our claim in cyberspace.
  4. Online document collaboration through Google Docs and Spreadsheets. This is pretty cool stuff, especially when working a lot online like we do.

Since we’re such a modern company we’ll probably be using many more online tools before we’re done.

It might be that a lot of ‘old school’ companies are still wondering how the heck these things work or why they’re even good. But I think some day people will be wondering how companies got by at all without this stuff.

Author: Tags: , ,

© 2006-2009 WireLoad, LLC.
Logo photo by William Picard. Theme based on BlueMod © 2005 - 2009 FrederikM.de, based on blueblog_DE by Oliver Wunder.
Sitemap