Apple Isn’t Your Friend

Apple has been steadily positioning itself as the anti-Facebook for a while now, and between verbal jabs aimed at the social media giant and privacy-focused product decisions, the patient goodwill campaign seems to be working. Unfortunately, Apple isn’t going to save us, and now’s the time to keep your guard up. Continue reading Apple Isn’t Your Friend

Advertisements

I got a new Mac, now what?

So you just got a new Mac computer, what are the first things you should do after unboxing and relishing in that new computer smell? Here are some of the basics you should do before you even connect to your social life …
Continue reading I got a new Mac, now what?

Completely Uninstall Office 2016 for Mac

Important:

To completely uninstall Office 2016 for Mac you must remove the applications, supporting files, and keychain entries, plus any icons you’ve added to the Dock. Once you’ve removed everything, empty the Trash and restart your Mac to complete the process.

You must be signed in as an administrator or provide an administrator name and password to complete these steps.

There are several things to remove. This article steps you through each one.

Continue reading Completely Uninstall Office 2016 for Mac

macOS 10.13 High Sierra Public Beta

macOS Public Beta is now active, however; there are many articles out there telling users how to signup then leaving them short of getting the actual update.

I have been checking for days now and the update would not show up.. So I dug around and found the installer.
Continue reading macOS 10.13 High Sierra Public Beta

Google Chrome – Your Preferences cannot be read

Logged into my Linux computer today and got this error as I tried to start Chrome. Tried the basics and it did not work, searched Google and saw many others having this same issue so I decided to document the process of fixing this issue here. I’ll start with the basic stuff first then will get into the more detailed steps.
Continue reading Google Chrome – Your Preferences cannot be read

Using Google Public DNS

Most people connect to the internet via their ISP’s DNS servers which more than likely are not the best and more than likely is slowing down your browsing. Using a 3rd party service not only speeds up your experience online. A while ago we wrote about OpenDNS, today we’re going over Google’s DNS service.

Important:
Make sure to write down your ISP’s DNS servers.

Google Public DNS IP addresses

IPv4 addresses are as follows:

  • 8.8.8.8
  • 8.8.4.4

IPv6 addresses are as follows:

  • 2001:4860:4860::8888
  • 2001:4860:4860::8844

Making the changes

Windows

  • Start the Network and Sharing Center (this process varies by windows version)
  • Click Change adadpter settings
  • Right-click Local Area Connection or Wireless Network Connection slelect Properties
  • Type in your administrator password if you are promted for it.
  • Click the Networking tab
  • Under the Internet Protocol Version 4 (TCP/IPv4) or Internet Protocol Version 6 (TCP/IPv6) and click Properties
  • Click Advanced and select the DNS tab, write down any IP’s that are listed here for future reference in case you want to revert later on.
  • Select Use the following DNS server addresses
  • Enter the IP’s from above
  • Restart your computer

Mac OS

  • Click the Apple menu ()
  • Click System Preferences and click the Network logo.
  • Select the connection you want to configure (Thunderbolt Ethernet or Wi-Fi or Display Ethernet) then click Advanced
  • Select the DNS tab
  • Click the + icon to enter the IP Addresses (repeat for each address)
  • Click Apply then click OK

Linux

I will go over doing this in Ubuntu since that is one of the more common flavors.

  • Start System Preferences and click Network Connections
  • Select the connection you want to configure Wired or Wireless tab, then select the appropriate network.
  • Click Edit, and in the window that appears, select the IPv4 Settings or IPv6 Settings tab.
  • If the selected method is Automatic (DHCP), open the dropdown and select Automatic (STATIC) addresses only instead.
  • If the method is set to something else, do not change it.
  • In the DNS servers field, enter the IP addresses, separated by a space:
  • Click Apply
  • If you are prompted for a password or confirmation, type the password or provide confirmation.

If your distribution doesn’t use Network Manager, your DNS settings are specified in /etc/resolv.conf.

Edit resolv.conf:

sudo vi /etc/resolv.conf

If any nameserver lines appear, write down the IP addresses for future reference. Replace or add, the following lines:

nameserver 8.8.8.8
nameserver 8.8.4.4
nameserver 2001:4860:4860::8888
nameserver 2001:4860:4860::8844

Save and exit

:wq

Restart any Internet clients you are using.

sudo /etc/init.d/networking restart

Routers

Every router uses a different user interface for configuring DNS server settings; we provide only a generic procedure below. For more information, please consult your router documentation.

Note:
Some ISPs hard-code their DNS servers into the equipment they provide; if you are using such a device, you will not be able to configure it. Instead, you can configure each of the computers connected to the router, as described above.
  • In your browser, enter the IP address to access the router’s administration console.
  • When prompted, enter the password to access network settings.
  • Find the screen in which DNS server settings are specified.
  • If there are IP addresses specified in the fields for the primary and seconday DNS servers, write them down for future reference.
  • Replace those addresses with the IP addresses from above
  • Save and exit.
  • Restart your browser.

SSH Private-Public Key Auth for Linux and Mac

First Things First

Important: This article is being re-written to consider new ecdsa security option now available. This is highlighted in red below in the “Choosing an Algorithm and Key Size” section.

There will be a new article that I will reference here.

First off, let’s talk about SSH keys and Security real briefly so that you can understand a bit more about what’s going on here and why it’s important. With all the issues happening in today’s digital age, everyone needs to start thinking about and taking one thing very seriously. You know, all the hacking and spying going on around us all.

One of the ways you can accomplish that is by using stronger encryption methods, in this case … SSH Keys or Public Key Cryptography. One of the major things is the key size. 1024 was common but that has long been hacked and not used anymore for websites and other public; so logically many are moving on to 2048 and even 4096, which is what I use.

SSH Keys provide a much more secure way to log into your servers than using passwords. While passwords can be easily broken by brute force attacks, SSH Keys way more difficult and if using a higher key can be almost impossible to decipher.

How does it work?

Generating a key pair provides you with a Private and a Public Key. You place the public key on a server you will connect to leaving the private key on your machine. When you SSH to your server you will not need to enter your password as your public key will be unlocked by your private key and you will be verified and allowed to get in. Continue reading SSH Private-Public Key Auth for Linux and Mac