Blog

Use Eyedropper Tool to Match Colors in PowerPoint

With the eyedropper tool in PowerPoint you can match the color from a shape or picture to another element of your presentation for a more cohesive look.

Select and apply a color with the eyedropper tool

Double-click the shape or other thing you want to match colors for. (To select multiples, press Ctrl and then click the shapes.) Then click any of the color options, such as Shape Fill in the Shapes Style group, found on the Format tab under Drawing Tools.

Shape Fill dropdown menu showing the Eyedropper

Using the eyedropper, click the color you want to match and apply to the selected shape or object.

Eyedropper cursor and matched color

As you move your pointer around the different colors, a live preview of the color appears. Hover or pause on a color to see its RGB (Red Green Blue) color coordinates. Click on the color you want. For a more accurate way of getting the exact color you want when many colors are clustered together, select the color by pressing Enter or spacebar instead.

Numbers for RGB colors selected using the Eyedropper

To cancel the Eyedropper without picking a color, press Esc.

Tip:   You can also match colors from elsewhere on your screen. After clicking Eyedropper, click and hold the mouse button as you drag your mouse to the color you want to match. The eyedropper tool disappears when you move outside the PowerPoint window, but the color will still preview and be matched.

Posted in: Mac OS, MS Office Tips and Tricks

Leave a Comment (0) →

Getting the most from OneNote, Part I: A hidden Office gem

The more information you put into OneNote the more useful it is. You can tag, flag, recognize, record and search just about anything.

Microsoft’s cross-platform notebook tool OneNote has long been a hidden gem in Office. In the last few years its success in the education market has prompted Microsoft to invest more in the application. As well as adding specific Learning Tools. Microsoft is bringing the Mac and web versions closer to parity with the desktop Windows version of OneNote, improving the iOS and Android mobile applications and building a brand-new Windows Store OneNote app that will soon replace OneNote 2016. It’s also making OneNote notebooks part of every SharePoint team site and Teams team. But what can you actually do with OneNote and how do you make it useful?

OneNote is ideal for storing unstructured information — not just the notes you take in lectures or meetings, or digital versions of Post It notes, but also photos, videos, receipts, emails (and attachments), web pages, PDFs, presentations, your optical prescription in case you break your glasses, the frequency for your favorite radio stations in cities to which you travel. In short, anything you can print, write down or photograph and might need to refer to one day.

Individual notes live in the sections of a notebook; you can have multiple sections in multiple notebooks that you keep private or share with colleagues and sync across devices. You can open a notebook that someone else has shared with you and have it fully synced on your own device, making it easy to collaborate. As you can rename and move all of these, you don’t need to get the perfect structure straight away. Instead, the first step of making OneNote useful is to put as much information that you might need later as possible in there, so that you can search for it.

Send everything to OneNote

You can type, handwrite, record audio and video, and paste in text, images, video and other content in OneNote. You can even do simple math in OneNote; just type in the equation, followed by ‘=’ and OneNote will work it out for you. You can also share and print from other applications straight into OneNote, but the different tools give you slightly different results.

OneNote 2016 has a snipping tool (trigger it from the toolbar, the Windows system tray or make a keyboard shortcut for it) that lets you drag to select an area and choose the notebook section or even individual page where you want to save an image of what you snip. You can find the section or page by searching for the title, so you don’t have to scroll through long lists of sections and pages.

In the Windows 10 OneNote app, you can use the Windows snipping tool, then either find the note you want and paste in by hand or open the Screen Sketch tool then use the Share charm (which can only target the current page or notebook section).

You can print from any application using the OneNote printer drivers. The OneNote 2016 printer driver is automatically installed and can print into any page or notebook section, which you choose in the same snipping dialog. The OneNote Store printer driver you have to install yourself from the Store, and can only print a new page into notebook sections, which you have to painstakingly navigate to rather than being able to search for. Both drivers save images of the individual pages you print. You can also import files into the current page in OneNote 2016 as printouts or attachments. Outlook on Windows (and Mac for Office 365 users) has a Send to OneNote button that copies email text and attachments, or the details of meeting attendees, into OneNote. You can also grab the details of an Outlook meeting that you want to take notes on from inside OneNote 2016 and OneNote 10, to get the list of everyone who’s there quickly.

If you use the OneNote Web Clipper extensions for Edge, Chrome and Firefox, you get the editable text and images (you can choose whether to clip the whole page or just the main content); you can clip into any notebook section that’s stored in OneDrive or OneDrive for Business (even ones that are shared with you) if you don’t have the notebook open on your device, but again not into existing pages. If you have a lot of notebooks and sections, having to scroll through the alphabetical list is much slower than the OneNote 2016 word wheel search. You can’t clip PDFs, so if you’re viewing them in a web browser, print them to OneNote instead.

OneNote is also a share target in the iOS and Android browsers, although that saves a printout rather than the editable text of the web page.

Microsoft’s Office Lens app on iOS and Android (and Windows Phone) can save images directly into OneNote sections, which is a good way of capturing whiteboards, presentations, business cards and documents. (The Office Lens feature is also built into OneNote on iOS and Android, so you can snap photos on your phone and have them show up in the right place in a note you’re editing on your Mac or PC).

OneNote is also an  “If This Then That” target  (IFTTT) so, you can do things like archiving tweets, RSS feeds, Reddit posts, DropBox files, starred Gmail messages or articles from Pocket, Feedly or Instapaper into OneNote. This isn’t always reliable and high-volume archiving will quickly hit the size limit of OneNote sections, but it’s very convenient when it does work.

If you record audio or video into OneNote (on Windows or Mac), any notes you take while recording or playing back the recording are time synced, so you can easily jump to the most important section of a meeting or lecture. (OneNote can also record unlimited audio on iOS, but you can’t take notes at the same time.) The audio is also searchable in OneNote 2016, but as it’s just matching the sounds of words it’s not very accurate.

Searching in OneNote

OneNote 2016 has one search box and two keyboard shortcuts for searching: Ctrl-E searches across all your notes (or a subset that you choose), while Ctrl-F searches within the current note. OneNote for Windows 10 has the same keyboard shortcuts, although they select from a unified search dropdown. Either way, that makes it easy to find the right note and then the right sentence. Both versions of OneNote use the same Ctrl-M shortcut to open a new window, so you have multiple notes open at once.

You can also see a list of recently edited notes, as a way of getting back to what you were working on recently. In OneNote 2016 you can pick multi-time periods (from ‘today’ to the last six months or even a chronological view of all notes in the section) or search for changes by specific people.

If you have a digital pen, or a touchscreen PC or iPad, you can draw and handwrite notes, and OneNote uses handwriting recognition to make them searchable even if you don’t convert them to text. If you want to draw with your finger, turn that on in the Draw toolbar — and then turn it off again when you want to go back to using your finger for scrolling. If you want more space for drawing, both OneNote 2016 and OneNote 10 have a full-screen mode that hides all the toolbars and other controls.

Images in OneNote are automatically OCR’d, so you can search for text shown in an image or a printout. You can also right-click on them to copy the recognized text to use elsewhere, making this a quick way of scanning paper documents.

Image OCR and handwriting recognition work locally in OneNote 2016, which also gives you the widest choice of where to store notebooks — in OneDrive, on your local PC or on a network file share. Notebooks stored in OneDrive can sync automatically to your other devices and you can share them with colleagues for live co-editing. Content syncs right into the page, marked by the initials of the person adding it. Notebooks stored on a network file share can sync onto other PCs that have access to the network, including over a VPN, but you can’t open them on other devices.

Branscomb, Mary. “Getting the most from OneNote, Part I: A hidden Office Gem” TechRepublic July 30, 2018

Posted in: Mobile Computing, MS Office Tips and Tricks, Tech Tips for Business Owners

Leave a Comment (0) →

Scam of the Week: “Another” New CEO Fraud Phishing Wrinkle

So, here’s a new CEO Fraud phish: see these fresh screen shots from emails reported to us through the free KnowBe4 Phish Alert Button. Bad guys spoof the managing partner and CPA and an accounting & consulting firm and ask an employee for the  “Cash/Bank Statement Reconciliation” for June of this year.

 

Now, it’s not immediately clear what the bad guys could do with the data from such a statement, but this may simply be a first step of a one-two punch that is meant to establish credibility. The next step would be a malicious request for salary payment records like a pay stub that allow the bad guys to change bank accounts for direct deposit salary payment to accounts they control.

Here is another variant, where the employee seems to be willing to comply:

And here is another variant

See the payroll phish screenshot, which asks an employee at a credit union to change the email associated with another employee’s ADP account to a non-company email address.

Of course, ADP already allows employees to do this on their own: http://www2.ccga.edu/Faculty/HumanResources/ADP/files/PersonalContact.pdf

We are expecting the scheme to work like this: once the email address is changed, the bad guys who control that email address can force a password change by selecting the “I forgot my password” option on the ADP portal, change the password, then effectively hijack the account. From there they can change the direct deposit info, mine the account for identity/tax refund theft, and so forth.

Presumably this same scheme could work with similar services (SAP, Paychex, Zenefits, etc.).

The “beauty” of this approach is that targeted employees as well as their employers would remain blind to all the fraudulent changes made after the email address is switched. How often do employees tend to log in to their ADP accounts anyway? Once every few months would be my guess. Perhaps even as infrequently as once a year. Two interesting observations about this particular phish:

  1. The bad guys didn’t bother spoofing the targeted employee’s corporate email address. They used the same address submitted as a substitute.
  2. The targeted employee doesn’t appear to be very senior in the organization. So, this might be some kind of initial test to see if the scheme works.

Sjouwerman, Stu. “Scam of the Week:”Another” New CEO Fraud Phising Wrinkle” KnowBe4.com blog July 20, 2018

Posted in: Security, Tech Tips for Business Owners

Leave a Comment (0) →

7 Tips to Using a Password Manager Safely

Password security can look pretty grim! However, the benefits of a good password manager – generating and saving complex, unique passwords you can easily update – mean that most experts recommend using one. “While it’s impossible to be completely immune from the most advanced threats, selecting the right third-party password manager can help users to protect their credentials from the majority of attacks that they may face,” says Baumgartner.

You can also take the following seven steps to ensure you’re protecting your accounts:

  1. Choose a password manager without master password recovery

Whatever you do, choose a password manager that does not allow for recovery of the master password. “If a malicious actor is able to get ahold of the master password through account recovery tools, this renders even the most secure password management programs useless,” says Baumgarten.

  1. Use Two-factor authentication

Any online account has a risk of being hacked. One way to circumvent this risk is to use two-factor authentication to protect your password manager. Chrome supports two-factor authentication with your smartphone, and, along with Firefox and Edge, also works with authentication hardware keys such as Yubico. Third-party password managers including Dashlane, LastPass and Sticky Password supports two-factor authentication with your smartphone. “While two-factor authentication may still have some risks due to threats like SIM hijacking, at a minimum it puts one more layer of defense between the cybercriminal and your full arsenal of login information,” says Baumgarten.

  1. Turn off autofill

You may want to consider turning off autofill. This also means logging into your password manager, then copying and pasting your passwords into the login screen.

  1. Use strong passwords

When composing your master password, make it strong. “By today’s standards this means 20 characters or more, randomly generated passwords that contain lower and uppercase letters, digits and symbols,” says Palfy.  You might be proud of how devilishly uncrackable it is – but don’t reuse your master password.

  1. Make sure all of your passwords are unique

Make sure all your other passwords are unique. Dashlane Premium is one of the options that can automatically check for weak or repeated passwords then automatically replace them with a random, complex password.

  1. Keep your software up to date

Download security updates for your password manager as soon as available – often, they will be patching newly discovered vulnerabilities.

  1. Be wary of downloads and browser extensions

In general, be wary of your downloads especially browser extensions – unwittingly installed malware could end up logging keystrokes or copying logins.

Choosing the right password manager

The best password managers do not allow you to recover your master password, they let you use two-factor authentication, they monitor your accounts for password breaches and weak passwords, they generate strong passwords for you, they back up your passwords securely online and they let you use a fingerprint or face ID to log in on your smartphone. Our favorite password manager, Dashlane Premium($60 per year), has all of the aforementioned features and more. It also fills out forms, including your credit card information, syncs across all of your devices, scans the Dark Web for personal data and account information and provides VPN service for your computer and smartphone to encrypt all of your data when using internet-based services over public WiFi.

This excerpt is taken from “Is it Safe to Use a Password Manager?”, an article written by Natasha Stoke, Techlicious.com. Click here if you would like to read the article in its entirety.

Posted in: Security, Tech Tips for Business Owners

Leave a Comment (0) →

Your Google Account Might Be Giving Outside Developers Access to Your Data – Here’s How to Disconnect Apps You Don’t Trust Before They Read Your Mail

You may not be the only one reading your messages in your Gmail Account.

While Google itself has stopped scanning Gmail users’ email, some third-party developers have created apps that can access consumers’ accounts and scan their messages for marketing purposes, according to a new report in the Wall Street Journal. In some cases, it’s not just the developer’ computers but their human employees who are reading Gmail users’ messages, according to the report.

Google has long allowed software developers the ability to access users’ accounts as long as users gave them permission.  That ability was designed to allow developers to create apps that consumers could use to add events to their Google Calendars or to send messages from their Gmail accounts.

But marketing companies have created apps that take advantage of that access to insights into consumers’ behavior, according to the report.  The apps offer things such as price-comparison services or travel-itinerary planning, but the language in their service agreements allows them to view users’ email as well.  In fact, it’s become a “common practice” for marketing companies to scan consumers’ email, The Journal reported.

It isn’t clear how carefully google is monitoring such uses.  Many consumers may not be aware that they’ve given apps such access to their accounts.  Even if they are, Facebook’s Cambridge Analytica scandal offers a worrisome example of how similar access to consumer data can be abused.

Here’s how to see which apps have access to your Google account and how to block them from accessing it in the future.

From your Google Account homepage, go to the Sign-in & Security section.

To get to your Google Account page, select the “Account” icon from the app menu in the top right-hand corner of your Gmail account or navigate to myaccount.google.com.

Click on the “Apps with account access” link or scroll down to the very bottom of the page.

In that section, you’ll see all of the apps to which you’ve given any kind of access since you created your account.

Select “Manage Apps” to see more details.


You’ll see what kinds of information and services inside your Google account to which the apps have access.

Google organizes apps that have access to your account into three different groups.

The three groups are apps that allow for “Signing in with Google,” “Third-party apps with account access,” and “Google apps.”

It’s obvious what Google apps are — things like Chrome and Drive. But here’s how the two other groups differ:

Apps in the “Signing in with Google” section have access to your name, email address, and profile picture. But in some cases they may have access to more of your information — potentially a lot more, such as the ability to read and delete your email messages.

You most likely gave the “Signing in with Google” apps permission to access such data because you wanted to use your Google login to sign into your accounts with them instead of having to create separate user accounts and passwords. But some companies that use Google’s apps in their workplaces also require their employees to use their Google login to sign in to other apps and services.

The “Third-party apps with account access” typically have access to much more than just your basic profile information. In fact, according to a Google support page, these apps often “can see and change nearly all information in your Google Account.”

Developers whose apps have such access to your account can’t change your password, delete your account, or use Google Pay on your behalf, but they can read your email — or have their employees do it.

Some apps require those kinds of permissions to do what you’ve asked them to do. If you want to be able to use a mail app on your computer to manage your Gmail account or your Google calendar, it needs to be able to read and delete messages or appointments.

But you should make sure you trust the apps and developers that have such access to your accounts and that you are giving them only as much access as they need.

If you see one you don’t trust, you can block it by clicking on “Remove Access.”

After clicking on that button you’ll have to click “OK” to confirm that you really want to block the app. The app should then disappear from the list of apps that have access to your account and should no longer have any ability to view or do anything else with your email or other data.

It’s a good idea to check the “Apps with access to your account” page every few months to keep your account safe from wandering eyes.

 

Posted in: Tech Tips for Business Owners

Leave a Comment (0) →

One of Microsoft Outlook’s Hidden Gems: “Advanced Find”

Our days keep getting busier and busier! Which in return equates to our need to be more efficient than ever.

Outlook has many features that can help us battle this busy culture.

Did you know that within minutes you can put your finger (or in this case, your mouse), on that one piece of mail that you know you received last week but didn’t have the time to file it properly, and now it’s buried beneath a plethora of recent mail? A general search can help a little, but will still produce a lot of unnecessary mail to weed through.

This hidden gem is Outlook’s “Advanced Find” – this quick and easy feature will save you lots of time.

So, let’s get started!

Begin by making sure you are in the mailbox you want to search.

Next, click your mouse in the search box on the top right; the option for Search Tools will then become available on the title bar.

 

Click on Search Tools>Advanced Find

In the Advanced Find box, you can specify much more complex criteria and even search in your calendar, contacts list, notes, and tasks. But for this demonstration we will choose an email search with detailed specifics.

 

Ideally, we would all like to be so organized that we would never have to search for that unfiled email, note, or calendar entry.  But I hope we can agree that this is a great tip for that occasional slip!

Go ahead and give it a try!

 

Posted in: Tech Tips for Business Owners

Leave a Comment (0) →

Make your Android or iPhone’s Fingerprint Reader Work Every Time

This dead-simple trick will keep you from wanting to throw your phone across the room.

Raise your hand if this is you: The fingerprint reader on your iPhone or Android phone fails often enough on the first try that you’re starting to wonder if you’ve been cursed with weird fingers.

Relax; there are plenty of reasons why you may not get an accurate read your first try, besides your mutant appendages.

  • Your fingertip hasn’t fully covered the sensor
  • You have wet hands
  • The phone didn’t get an accurate read when you first registered your print
  • The phone maker’s implementation may make the reader more sensitive, like if there are more demanding layers of security built into the software

This tip won’t help with all of those, but it definitely helps.

If you’re up to here with trying to unlock your phone so many times that you have to revert to a password or passcode, stop. Take a deep breath. And try this dead-simple solution that really works.

Register the same print two or three times. I do this with the phones I review and it makes the devices much more likely to unlock the first time around. For example, I’ll scan the finger I usually unlock the phone with at least twice — say, my thumb — and then scan a second finger that I might use to also unlock the device, like my index finger. I’ll usually also scan the index finger of my non-dominant hand, which has bailed me out more than once when I had my hands too full to unlock the phone as I normally would.

The reason multiple scans of the same finger works is because when you register your fingertip the first time around, it isn’t always clear which parts of your print the software has captured. A nominally helpful animation will urge you to lift your finger to capture more area, but that doesn’t necessarily reflect the data your phone’s actually storing.

By laying down the same fingerprint more than once, you’re doubling or tripling the chances that your phone will capture enough data.

Of course, adding duplicate digits won’t solve your unlocking issues if you constantly struggle to reach the reader, or if your hands are too wet for the phone to register your print.

How to register multiple fingerprints on your phone

Most phones give you a maximum of five fingerprints for security reasons. The more fingers you wave through, the higher the probability the phone will unlock for false positives, the reasoning goes.

On Android phones:

  • Open Settings
  • Tap Security
  • Tap “Fingerprint”
  • Re-enter your PIN
  • Tap “Add fingerprint”

On iPhones with Touch ID:

  • Open Settings
  • Tap Touch ID & Passcode
  • Enter your passcode
  • Under the section “Fingerprints” tap “Add a Fingerprint

Dolcourt, Jessica. “Make Your Android or iPhone’s Fingerprint Reader Work Every Time” CNET July 5, 2018

Posted in: Mobile Computing, Security, Tech Tips for Business Owners

Leave a Comment (0) →

7 Utilities to Make Your Windows PC More Powerful

Microsoft is building some of these features right into Windows 10

Later this year, Microsoft will be introducing features that are similar to — and might even obviate — three of the utilities we will talk about.  It’s a good indication that “Microsoft is listening” to its users.  Although that open ear and open mind has its limits. The Redstone 5 update will have better screenshots, and clipboard history — among many other improvements.

Of course, if you’re Microsoft, you have the “opportunity” to focus on your desktop OS more than others. When you don’t have a phone operating system to worry about, it’s a lot easier to put your efforts into what you do have.

At the same time that Microsoft is adding much-requested features, it’s also pushing just as hard to box its users into using Edge, Cortana, and Bing. We’re a long ways from the legal battle that forced Microsoft to stop pushing IE back in the day, but Windows 10 should respect a user’s default choices.

It’s tempting to resign yourself to that kind of bundling in modern operating systems. After all, Apple is even more locked-down on iOS and ChromeOS only recently began offering ways to use other browsers. And when I use Windows 10, I tend to stick to Edge because I think it’s a lighter-weight browser.

But let’s not do that. Windows 10 and the Mac are the two biggest and best mass-market operating systems that are easy to customize at a deep level. As I’ve said so often that I know you’re getting tired of it, that customization is important. It empowers users and can serve as a way to get people to feel confident doing more complicated things on their computers. It’s a lot easier to think you can learn to code if you’ve already fixed a bunch of little hassles on your computer.

At the risk of turning this into yet another Mac vs PC debate (this isn’t the moment), I will say that I’m mainly disappointed in Microsoft’s aggressive tactics with Bing and Edge because the rest of the OS is just so good. There are so many little things that are smart: auto-hiding icons in the System Tray, snapping windows, and the Start Menu.

I still wish the app ecosystem was stronger, but I give credit to Microsoft for being ahead of both Apple and Google in trying to bring mobile app (and web app) paradigms to the desktop. Maybe too far ahead of its time, in some ways.

Anyway, if you haven’t used Windows 10 in awhile, I encourage you to take a fresh look. It’s very close to feeling like a whole and complete thought instead of a bunch of new features tacked on over the years. There are little hassles and plenty of inelegant things to complain about, but there’s also a coherence that you won’t get on other desktop platforms.

And when it doesn’t meet your needs, there are utilities for that. Here are seven we like (two of them were cut for time in the video above).

  • Eartrumpet, free. A super neat System Tray utility that gives you volume levels for every app and also lets you set custom inputs and outputs. Basically a must-install.
  • Groupy, $9.99 ($7.49 at publication). You know how tabs on your browser are useful? Groupy lets you take any app you have open and make it a tab in another app. It sounds like overkill, but the ability to separate out different tasks into tabbed windows with different apps in them is really powerful. Also available as a bundle with Object Desktop, a bundle of a few other clever utilities like Fences, which organizes your desktop icons. Microsoft’s upcoming take on this feature is called Sets, which you can read about here. Update: after publication, we learned that tab sets won’t be coming this year.
  • ShareX, free. I have long been a Lightshot fan for screenshots, but ShareX is a lot more customizable and powerful. It’s also a lot less elegant, unfortunately. But if you take as many screenshots as I do, the ability to automate the most common next steps is well worth the effort. Microsoft’s improved screenshot tool coming later this year might obviate the need for this for many.
  • Ditto, free. I can’t work effectively without a good Clipboard History tool. Ditto is fast, simple, and works well. Here again we have a utility Microsoft is building into Windows 10 — though Microsoft’s version will also do cloud sync with other devices.
  • Wox, free. This is one of those launch bar / search boxes you bring up with a keystroke. I use it because even though hitting the Windows key for Cortana is fast and easy, it’s locked to Bing and Edge (without further utilities like EdgeDeflector). Wox is kind of a pain to set up, but it lets me set custom web searches like “pages posted in the last day” on Google.
  • Sharpkeys, free. A little utility that makes it easy to remap keys. You could write to the registry directly, but that feels very 1995. I use it to remap Caps Lock to a function key (which then launches Wox). When I die, my tombstone will read “Tried to get every company to replace the Caps Lock Key with a Universal Search key. Nobody listened.”
  • QuickLook, free.  (Article on Quicklook was written by Tom Warren.) It’s a little thing that lets you quickly preview files in the File Explorer. Seems to be more elegant than Seer, but I haven’t used it long enough to say for sure which one I prefer.

Bohn, Dieter. “7 Utilities to Make Your Windows PC More Powerful” The Verge June 27,2018

Posted in: Tech Tips for Business Owners

Leave a Comment (0) →

How to Change the Safari Download Location on Mac OS

By default, the Safari web browser for Mac will download any files to the Downloads folder of the active user account. Most Mac users will likely be satisfied with that, but some may wish to change the file download directory in Safari for Mac OS to another directory. Likewise, if you have changed the Safari download destination, you may wish to revert back to the default download folder for Safari on the Mac.

This tutorial will show you how to change the Safari downloads location in Mac OS. You can change it to any directory or folder you have access to, or you can revert back to the default Safari downloads destination of the user Downloads directory.

Making this adjustment will change where all downloaded files from the Safari web browser go to on the Mac. It will not impact other applications and where they download files.

How to Change the File Download Location in Safari on Mac

  1. Open the “Safari” web browser on the Mac if you have not done so already
  2.  Pull down the “Safari” menu and choose “Preferences”

3.  Go to the “General” tab and then look for the “File Download Location” section and click on the Downloads dropdown menu.

4. Choose “Other” to change the downloads destination in Safari.

5.  Navigate to the directory you want Safari to download files to and choose “Select”

6.  Exit out of Safari Preferences when finished.

Now all future downloaded files or items from Safari will go to the folder or directory you selected.  for example, if you selected the Desktop, then all Safari downloaded files will appear on the desktop of the Mac.

Changing the download destination for Safari only applies to downloads and files going forward, any flies downloads before this change was made would appear in the location set prior to any adjustment.  If you aren’t sure where a particular file downloaded form Salari is located, you can search on the Mac with Spotlight for the file name, click the magnifying glass button in the Safari Downloaded Items List or manually ivenstigate the user Downloads folder or whatever you had/have selected as the Safari download location.

How to Change Back to the Default Download Location in Safari on Mac OS

If you had prviously customized the location of the Download directory away from the default (downloads) and to another directory, you can change it back as follows.

From the Safari browser, go to the “Safari” menu and choose “Preferences”

    1. From the Safari browser, go to the “Safari” menu and choose “Preferences”
    2. From the “General” tab look for the “File Download Location” section, and then click on the Downloads dropdown menu and choose “Downloads”
      • If “Downloads” is not in the dropdown menu, choose “Other” and navigate to your user Home folder then select the “Downloads” from from there
      • Exit out of Safari Preferences when finished

    That’s it, now the Safari downloaded file destination directory will be reset to default ~/Downloads folder on the Mac.

    Most users are better off keeping all downloads in the Downloads folder of Mac OS for consistency sake, because it makes keeping track of downloaded files particularly easy if all apps are downloading all files into the same location. By default, most Mac apps that are able to download files will use the user Downloads folder as the destination for those files, including Safari, Chrome, Firefox, most SFTP apps, and even file transfer features like AirDrop saves files to the Downloads folder by default on MacOS.

    Of course this applies to Safari, which also happens to be the default web browser on a Mac, but if you use a different web browser then changing the default download location would be different.

    And in case you were wondering, yes this guide applies to both regular Safari, Safari Beta, as well as the Safari Technology Preview builds. The download settings will be similar but slightly different if you happen to be running Safari on Windows PC but since that Windows-specific software build is no longer actively developed it’s usage is debatable.

  1. Horowitz, Paul. “How to Change the Safari Download Location on Mac OS” OSX Daily July 1, 2018

Posted in: Mac OS, Mobile Computing, Tech Tips for Business Owners

Leave a Comment (0) →

7 Passwords You Should Never Use at Your Small Business

Owning a small business means owning data. You’re constantly acquiring new information related to your customers, your financial details, and all the vendors and contractors with whom you work.  One cyber criminal, though, one lucky hack, and you’ve just exposed your business to a major blow. From lost trust among your clients to costly lawsuits for the damage done, protecting your company from data theft is among your most important responsibilities.​

A lot of it comes down to one simple choice you make:  passwords.

“Overall, passwords still present the biggest challenge for businesses of all sizes,” said Ron Schlecht, founder and managing partner of BTB Security. Businesses hire Schlecht’s company to test their digital security for weak spots and, he said, “you can’t imagine how many times we still break in to companies because of a bad password.”

If you want to avoid weak passwords at your business, start by steering clear of the following list. Read on for seven passwords you should never (ever) use.

Password

Arguably, this is the number-one and most common bad choice. Also prevalent are variations such as P@ssword and P@55w0rd!. These might be easy to remember, but they’re also among the first options hackers will try.

QWERTY

Easy-to-guess passwords often take root because they’re simple to remember. That’s the story with this hacker-friendly option constructed from the sequence of letters at the top left of the typical computer keyboard.

12345

Or, 98765. Or, 4567. You get the picture — no consecutive numbers (and the same goes for sequential letter combinations). You can only count on passwords such as these to expose your business to digital theft.

BusinessName1

If your shop is called Serafina’s Weddings, don’t set your password as SerafinasWeddings1. That would be a early choice for hackers looking to break into your valuable data.

Business Address

Skip it entirely, when it comes to passwords. Also avoid trying to mash together similar details, such as your street name and street number — i.e. Main215. 

Date of Birth

Thanks to the Internet, it doesn’t take much effort to find a person’s DOB. Birthdays, birthdates, years of birth — all of them make for readily attainable passwords and are poor choices for your company.

Simple Dictionary Words

Especially if they’re related to your business, don’t use them. No baseball, football, or soccer for your sporting goods store. No muffler, tire, or spark plug for your auto garage.

 And so, what should you do when it comes to picking a password?

A key approach starts with thinking of a passphrase. Next, substitute letters, characters, and abbreviations for parts of it. For example, my first car was a Honda in 1990 would be easy enough to remember, if that was the case in your life. Now, change it to my1stc@r=honda90.

Steer clear of the not so magnificent seven above, and protect your data with hard-to-guess constructions. With a strong password strategy, you’re well on your way to foiling online attacks.

O’Brien, James. “7 Passwords You Should Never Use at Your Small Business” The Hartford, Small Biz Ahead. June 2018

Posted in: Business, Mobile Computing, Security, Tech Tips for Business Owners, Technology

Leave a Comment (0) →
Page 1 of 22 12345...»