Jessica Mellow in the iPhone 5 waiting line.
(Credit: Greg Sandoval)
People have already begun to line up outside of the Cube, Apple’s 5th Avenue store. They have been there since Friday afternoon—one week before the release data for the iPhone 5. These people are sitting and sleeping out on the sidewalk in front of the store. Many will come to line up so they can buy an iPhone 5 on the very first day; however, some people do not just line up to buy the latest iPhone. People like Hazem Sayed and Jessica Mellow also camp out in line to promote or market something when interviewers come by. Sayed desires to get publicity for a software application. In addition to waiting in line to get an iPhone, Mellow camped out last October before the release of the iPhone 4s to promote a company. 
When it comes to Apple releasing new products, people can act strangely. Even Apple’s co-founder Steve Wozniak lines up to wait for a device. While waiting, he chats with Apple fans and signs their iPhones. Wozniak must love the experience because he “could certainly buy the product before it come[s] out”. Some will try to sell their spot in line; however, they have failed. A guy in London got several companies to sponsor his waiting in line; the companies paid for “everything from the food he ate to the gear that protected him from the elements”. 
No matter what product Apple releases, people will line up for it regardless of what the weather is like. They respect the quality of the devices that Apple designs and sells. Apple has a good reputation for designing and developing quality hardware and software. Their hardware and software are created to work in harmony together; the Apple quote “it just works” illustrates this very well. In countless keynote speeches, Apple representatives have repeated this phrase.
AntiSec, short for anti-security, claims they stole 12 million Apple iOS device Unique Device Identifiers (UDIDs) by breaching FBI security. The group released a million of them on a website. AntiSec alleges they had a computer belonging to a FBI agent to gain access “to a file containing the list of the Apple IDs”. The online posting “did not identify the agent or who the ID numbers belonged to.” 
AntiSec said that they chose to only “release a portion of the Apple IDs list to get people’s attention to its claims that the FBI is gathering people’s Apple device details.” In the note that AntiSec posted online, AntiSec said they have learned that people do not pay attention when one says, “hey, FBI is using your device detail.” The AntiSec group claims that a portion of the devices on the list contains names, telephone numbers, addresses, and ZIP codes, but they chose to only reveal the user IDs, device types, and device names in the portion of the list it released. 
This information could cause lot of problems for Apple devices owners since their personal and contact information is tied to their device’s UDID. A CNET article states that the online posting “says the group posted the data out of suspicion the FBI was using the UDIDs for nefarious purposes, such has people tracking, as well as to protest the use of UDIDs in general” . A lot of the personal data was removed before posting the IDs online, but the hacker group left enough data for “ ‘a significant amount of users’ to search the list for their devices” .
Even though you can use a tool like they one developed by the TNW tech team , there is little to nothing a device owner can do to protect their information or have their device information removed from the list. Users cannot change their UDID “the way you can change a password” .
In our society today, protection of private information is crucial. However, security protocols have to be continuously updated. Data leaks like this can scare individuals because they do not know what the outcome of the data leak will be. With incidents such as LinkedIn passwords being compromised ; 350,000 UNC Charlotte students’ social security numbers exposed in a data breach ; Yahoo, Gmail, and AOL passwords being leaked ; and countless other information exposures, more users are aware that their information is not as safe as what many people believe. As stated above, data breaches and information leaks can and have happened to other companies, not just Apple.
Mashable’s article titled “38% of us Would Rather Clean a Toilet Than Think of New Password” reports that login credentials and site authentications are a hassle for many people. In a recent Harris Interactive poll, “some 38% of us think attempting to solve world peace would be a more manageable task than trying to deal with yet another set of login credentials.” All of this hassle makes it easier for hackers to gain access to our online accounts because we tend to either use to same passwords for multiple accounts or we forget our passwords. 
I find it difficult to create and remember every password for every online account that I have. For each site that I visit, there are different sets of password rules. The rules dictate how many characters I can use; if the characters are upper case, lower case, or a mixture of both; whether or not numbers are allowed; what symbols are allowed; if a password history restriction exists; etc.
After getting all of the password rules and restrictions straight in my head, I have to come up with the most secure password that I can think of and remember. I try not to use all dictionary words. Words found in a dictionary do not make a strong password . Many times, people try to substitute numbers in for letters; Lifehacker points out that password hackers are able to isolate patterns and get around our “clever password trick” .
In addition to developing a secure password, Google suggests that in order to keep your passwords secure that you never write them down, do not tell anyone your password, and change it often . A service called LastPass allows you to create one strong password for your LastPass account. LastPass claims that your LastPass account password is “the last password that you’ll have to remember” . When you need a new password for an online account, LastPass generates a random password for you and stores it in your account. This service is great until a hacker cracks the password to your LastPass account.
Keeping accounts secure is essential in the age we live in. Individuals and corporations have sensitive information that lives online. It is imperative that this information stays out of the hands identity thieves, hackers, criminals, etc.
How secure are your passwords?
My wife has an iPhone 4s on the Verizon network. After I did an over the air (OTA) upgrade to 5.0.1, the phone would only show the phone number for the people that was texting and calling her (even though their contact information was still in the contact app).
Here is how I fixed the issue:
1) Open the Phone and dial *228. This is a Verizon over-the-air programming number.
2) When the system answers press 1 for “Program or activate your phone”
3) Wait for the call to disconnect. You should get a prompt stating something like, “Settings updated.”
4) Dial *228 again.
5) When the system answers press 2 for updating your roaming capabilities
6) Wait for the call to disconnect. You should get a prompt stating something like, “Settings updated.”
7) Open the Settings App.
8) In your mail and contact settings, delete the account(s) that you use to sync your contacts. This could be iCloud, Gmail (via Exchange), etc.
9) Open the Task Manager (double click the home button) and kill the open Applications by long tapping one of the icons. When the icons begin to shake, tap the red circle with the minus sign.
10) Turn off the iPhone. Then turn it back on.
11) Open the Settings App.
12) In your mail and contact settings, add back the account(s) that you deleted in step 8.
13) Wait a few minutes (3-5mins)
14) Open the Message App and Recent calls list to verify the fix.
Others have tried this fix:
1) Open the Settings App
2) Go to General > International > Language
3) Set the phone language to British English
4) Open the Task Manager (double click the home button) and kill the open Applications by long tapping one of the icons. When the icons begin to shake, tap the red circle with the minus sign.
5) Turn off the iPhone. Then turn it back on.
6) Open the Settings App
7) Go to General > International > Language
8) Set the phone back to US English
A password needs to be unique. A unique password is very important, because it is what keeps personal information secure.
Below are tips on how to create a secure password and keep bots from guessing your password.
- Be creative. Don’t use words that can be found in a dictionary.
- Use at least six characters.
- Don’t use a password that you have used elsewhere.
- Don’t use keyboard patterns (asdf) or sequential numbers (1234).
- Create an acronym. Don’t use a common one, like NASA or SCUBA. Don’t make your password solely an acronym, combine it with numbers and punctuation marks.
- Include punctuation marks. Mix capital and lowercase letters. Include numbers.
- Include similar looking substitutions, such as the number zero for the letter ‘O’ or $ for the letter ‘S’.
- Include phonetic replacements, such as ‘Luv 2 Laf’ for ‘Love to Laugh.’
- Don’t make your password all numbers, all uppercase letters, or all lowercase letters.
- Find ways of collecting random letters and numbers, such as opening books, looking at license plates or taking the third letter from the first ten words you see.
- Don’t use repeating characters (aa11).
- Don’t use a password that is listed as an example of how to pick a good password.
Tips for keeping your password secure:
- Never tell anyone your password. Don’t write it down.
- Never send your password by email.
- Periodically change your password.
I got my first mac the other day. I purchased the Macbook Pro 13.3”. It has been an interesting journey learning the new operating system. So far, I am really enjoying it.
I got it to replace by older Hp Pavillion laptop. I got a new laptop that would last me through college and be fast enough to run the programs that I need for my engineering classes.
I installed Parallels Desktop 5 for Mac. It allows me to install other operating systems on virtual drives. So far, I have installed Windows 7, Chrome OS, and Ubuntu 9.10.
I have enjoyed learning my way around the Mac OS X and testing Chrome OS and Ubuntu.
View my MAC page here.
A few weeks ago, I began testing the stable release of MS Windows Se7en Pro. So far I like it. It has the look and feel of Vista. However, I believe that I am going to have to get a new video card for my computer that is fully compatible with Se7en. I would like to use the Aero feature and have dual monitor support. But I will have to wait until I have some spare money laying around to upgrade my graphics card. And as you know, college kids are always broke; so it looks like I won’t get a new one anytime soon. Anyone wanna donate a new graphics card to me??