The Cupertino-based company is dropping the hammer soon on 32-bit apps to push developers to move their software to 64-bit.
Apple published a support document last week about their plans on pulling the plug on 32-bit apps. “To ensure that the apps you purchase are as advanced as the Mac you run them on, all future Mac software will eventually be required to be 64-bit,” it said.
Mac owners are starting to get pop-up warnings as “an advance notice” when they launch 32-bit applications, including Word from Office for Mac 2011. The move for 64-bit apps is inline with the release of macOS High Sierra 10.13.4.
There’s no reason to panic though. You probably aren’t using anything essential that can’t be easily replaced with something more current. However, if you want to check your apps, here’s the step by step guide:
Hold the Option Key and click the logo in the top left corner. (Holding the Option Key will replace the System Preferences to System Information.)
Go to Software then click Applications.
The left-most column is named 64-Bit. The apps labeled No instead of Yes are the ones you should replace in the future.
Apple has yet to specify the exact schedule for the 64-bit transition to be complete saying it “is still underway”. When this is, we’ll have to wait and see.
More ways to better use your iPhone and Mac together.
Apple has always designed their products to work seamlessly together. We all know about airdrop, iMessage and iCloud notes, and if you own the iPhone and the Mac, you know how this makes our productivity so much better.
Below are more ways to use Apple‘s products together.
This feature basically allows you to copy an item (a text, image) from one device and paste it on your other device. For example, all you have to do is copy a text (like a URL or an email address) as you normally would and paste it to your notes on your phone.
Do take note that the copied data is only available for pasting for a short period of time so try to do it as soon as possible. You must also have Wi-Fi, Bluetooth, and Handoff turned on. Handoff is accessible in the System Preferences (on your Mac) and in Settings (on your iOS devices).
You can actually edit your videos on your phone and then continue doing that on your Mac without having to transfer over your files.
To do this, go to your iMovie and select any project you’ve created. Click the Share icon and select Airdrop. You will be asked to choose if you want to share the Video File or the iMovie Project. Choosing the video file will export the video while choosing the iMovie Project will of course let you transfer all files including the timeline.
Hand-Off Between Apps
The handoff is a very neat feature that came with the latest software.
This allows you to pick up where you left off on majority of the apps from Apple and some third-party apps like Chrome. When you’re using Chrome on your mac, and want to switch to your phone, just double tap your home button (or for iPhone X, tap and hold the bottom of the screen, move your finger up, and hold again) and you will see the handoff icon at the bottom.
If you’re on your phone and want to switch to your mac, just take a look at your dock and you will see an icon with a phone at the far left of your dock.
Again, for all of these to work, please make sure that you have Wifi, Bluetooth and Handoff enabled. You must also be signed-in to one iCloud account using the same Apple ID in all your devices.
A tiny USB adapter would allow you to use a PS4 controller with a Nintendo Switch. While gamers branded it as an expensive add-on, it is nonetheless, a solid gamepad. Gamers called it as the 8Bitdo Wireless USB Adapter.
The adapter was released by 8Bitdo, a popular company known for marketing a retro-style controllers. The company is selling the adapter for $19.99. Using this adapter allows gamers to use several numbers of controllers with the Switch.
What is 8Bitdo Wireless USB Adapter?
What good about this 8Bitdo Wireless USB Adapter is that it supports both Sony’s Dual Shock 3 and Dual Shock 4. The company also has other controllers designed to work with other gaming consoles.
And this 8Bitdo Wireless USB Adapter could actually be a better alternative even though you have already a Sony’s Dual Shock 4. The company’s adapter also supports other Nintendo modern controllers like the Wii remote, Wii U Pro Controller, as well as the Switch’s Joy-Con and Pro Controller.
Well, obviously, using the adapter gives you allot of options to play any games. But the adapter is not just only working in Switch. It is also compatible with Windows, Mac, Android TV, Raspberry Pi, and Retrofreak devices.
This means that gamers have been given many ways to explore the adapter’s functionality beyond the controllers they already own.
Voice Over IP service Skype is having trouble with their service as of late. According to reports, this four-week-old problem sends copies of some messages to unintended recipients.
Microsoft has confirmed the reports and said in a statement to Engadget, “We are aware that in rare circumstances IMs between two contacts could be sent to an unintended third contact. We are rolling out a fix for this issue in the next few days and will notify our users to download an updated version of Skype.”
The problem was initially reported on a Skype support forum by a user who was stunned as to why some of her contacts were receiving message she had sent to only a few contacts. Others followed her lead and reported that they experienced the same problem.
According to Skype, Skype versions 5.9 and 5.10 for Windows, Skype 5.8 for Mac, Skype 4.0 for Linux, 1.2 for Windows Phone, Skype 2.8 for Android and Skype 4.0 for iOS are vulnerable from these bugs.
Skype added in a blog post, “This issue occurs only when a user’s Skype client crashes during a Skype IM session, which many in some cases result in the last IM entered or sent prior to the crash being delivered to a different IM contact after the Skype client is rebooted or logged in as a new user.”
Be wary of this problem. You might send a raunchy message to your boss!
Do you have OS X Mountain Lion? Have you noticed the increased security placed on it? It looks like Apple took a page from Microsoft’s book by enabling your device to check daily for security updates. This is opposed to the usual weekly updates that they used to do.
It seems like the update and installation will be automatic, too. You wouldn’t have to choose it because Apple has chosen it for you and will download and install it, regardless of what you are doing or where you are. We can only learn by experience if this will be a nuance or a welcomed addition, as users go by their daily tasks.
Apple also added for you the Gatekeeper. The Gatekeeper is supposed to act by preventing non certified Apple applications from entering your walled garden. This is to make sure that unsigned and potentially dangerous applications are kept at bay. Wait, potentially dangerous?
Apple has long touted that the MAC is a haven of security. No viruses, safe and secure computing, no fear. That has been a long standing argument that MAC users put forth in any MAC vs. PC wars that go around the net. It seems like they will now have to find new ammunition against the enemy as PC viruses DO exist now in a MAC environment.
MAC users are growing. Yes, GROWING. The allure of a safe computing environment and reported stability and durability of Apple computers brought about this change. Not to mention the status symbol that this particular piece of hardware brings you whenever people see you with it. Now that they have more users, hackers and no-good doers have even more incentive to actually prove a point that PC users were trying to make a long time ago. The MAC only had great security and lack of viruses because no one wants to build one for it yet, due to the lack of user base. The reason why Microsoft’s Windows always get attacked, is because they were used by a large number of people, and would yield the most profit in an attack.
Apple has now taken a humility pill by re-advertising the MAC as a unit “built for security” rather than saying “it doesn’t get PC viruses”. They have been proven wrong, and the MAC is no longer as secure as the users thought.
So there we have it, the MAC has taken more than a couple of pages from Microsoft to boost its security, in light of the now more frequent attacks against its users. The daily updates are now as much a nuance for MAC users, as it is for PC users.
Do Mac users really spend more than their PC counterparts?
It’s obvious that the majority of PC owners shell out considerable sums of money to purchase their units, but it is also clear that Mac users shell more than them.
Now, a study done by travel site Orbitz says that Mac users will pay more on hotels than PC users.
In a report by The Wall Street Journal, Orbitz says that Mac users pay $20 to $30 more than PC users.
The report added, “The sort of targeting undertaken by Orbitz is likely to become more commonplace as online retailers scramble to identify new ways in which people’s browsing data can be used to boost online sales.”
A new malware is spreading targeting your computers that uses photos of a topless supermodel to lure you into infecting your system.
Security firm Sophos said the malware, which is called OSX/Imuler-B, is using images of a Russian model Irina Shayk an FHM magazine cover girl.
Sophos said in a blog post, “By default, Mac OS X doesn’t display file extensions. Which means that Mac users might be duped into believing that the file they are about to click in is a JPG image, rather than an application. Mac users – learn from the mistakes of Windows users in the past. Think before you click, and don’t ever underestimate the ability of cybercriminals to exploit the most primal urges of computer users.”
They said that when you click on the file, it will automatically launch a Trojan that will also create a genuine JPG image of Shayk then delete itself afterwards.
Once done, the malware is no longer in the folder but is already in your Mac’s system.
Sophos added, “ Behind the scenes, the malware opened a backdoor to your computer and is uploading private information to a remote server. The trick of hiding a file’s true nature by exploiting an operating system’s default disabling of extensions is not a new one, of course. It’s something we’ve seen many Windows users be fooled by in the past.”
Macs are known to be one of the safest, if not the safest, computers in the world. Compared to Windows, malwares are far too few in the Mac operating systems.
Unfortunately, antivirus firm Integro reported that cyber criminals that are responsible for the Flashback Trojan have been on it again and have started to spread another malware package. This seventh variant of the latter uses new techniques to infect Macs.
The Flashback is a Trojan attack that uses a number of methods to infect the system. It tries to take advantage of Java security hole to install itself. Those who do not have Java installed, it will use various techniques to trick users. It can disguise itself as a legitimate Adobe Flash installer and display certificates that appear from Apple to trick users to install the program.
Once installed, it injects the code into the web browsers and other applications in order to get passwords and other personal information. One good thing is that affected programs crash most of the time so users need to reinstall them.
So to be safe, Mac users should install a malware scanner and update it regularly.
Can I Run Multiple Operating Systems on My Server?
Can you imagine if you could only work with one application such as e-mail, word processing, or browser at a time? This would obviously be a radical impairment on our ability to work. The same holds true for operating systems and platforms. Restriction to one of these at a time is a needless hindrance, and now Dell virtualization provides a way to run Windows, Linux, Mac, and other operating systems on one server.
Dell virtualization software allows you to run more than one operating system on a server. Virtualizing can save money, time, energy, and space by using remote technology to accomplish a variety of tasks without being tied down to the physical contingencies of a physical server.
To install the software for virtualization, you boot up the server or computer, load the virtualization program, and install an operating system from the media you have. The main operating system will be called the host operating system; secondary platforms will be guests. Once the virtualization program is running, each operating system you install on your server will perform like a new, separate computer. You can do anything on the guest servers that you can do with the host. You can run programs, share files, and partition drive space. The litany of benefits of virtualization includes:
Consolidation of Servers – Your server infrastructure can be maximized without having to purchase additional hardware; resources can be used more efficiently.
Management Made Easier – Managing one physical server with more than one virtual server is easier than managing several physical units. Hardware upgrades can be done using a management console, which eliminates having to shut the server down, install the hardware, and restart the server. Servers can all be managed with the same console.
Reduction of Backup and Recovery Time – Backing up and restoring virtual machines is easier as well. Hard drives and other hardware failures will not affect virtual machines as they are restricted to their physical medium.
As you can see, virtualization is a smart, efficient way to make the most of your networking infrastructure.