Intro to iOS 7 Class

iOS adoption rate is astounding,to_date:0
• Can I go back? No.
• Signing for iOS 6 was turned off the weekend of 9/21
Interface changes
• Lock screen
• slide from anywhere
• flick up for camera
• pull down for notification – Settings are in Setting – Notification Center
• flick up from off screen for Control Center
Home screen
• search is hidden in plain sight
• Parallax effect can be turned off
Control over fonts
• Settings – General – Text Size
• Settings – General – Accessibility – Larger Type
• Settings – General – Accessibility – Bold Text
App Switcher – how to unload app states – slide app up
• Fingerprints for iPhone 5s only
• Set a complex password – Settings – General – Passcode & Fingerprint – Simple Passcode Off
• Set up Restrictions
• General – Restriction – Control Access to almost every single feature on the phone
• iPhone 5S, iPhone 5C, iPhone 5, iPad (4th generation), iPad Mini
iTunes Radio
• Ad supported “Pandora like” service built into iTunes
How to manage space on your iDevice
• Settings- General -Usage
• The first section is the Storage section. Give your iPhone or iPad a minute to load everything. The more data you have, the more it has to load. Tap into any item in the list to see more details on how much storage space it’s taking

Double click space in messages for period
There is a whole new set of sounds including Swish
aftermarket Lightning cables – beware of cheap cables. Stick with Amazon or Monoprice
Period button .com shortcut

According to BGR – here’s something that should embarrass Microsoft’s OEM partners: The most reliable Windows PC in the world wasn’t even designed to run on Windows. ZDNet reports that a new study from PC efficiency software vendor Soluto has used “data from its massive online database of PC crashes, hangs, and performance metrics to identify the 10 most reliable Windows PCs you can buy today.” The study found that the 13-inch Retina-equipped MacBook Pro with Boot Camp installed is “at the top of the list.” Other reliable PCs include the Acer Aspire E1-571, the Dell XPS 13, the Dell Vostro 3560, the Acer Aspire V3-771 and Apple’s 15-inch Retina-equipped MacBook Pro. Taken all together, then, Apple computers account for 33% of the six most reliable Windows PCs in the world while no PCs produced by the world’s leading vendor HP even crack the top 10.

As of 2013 I’d definitely recommend an iPhone over an Android – and here’s way –

Quote – Among all mobile devices being used to connect through Gogo (an in-flight wifi company), 84 percent carry Apple’s iOS operating system while 16 percent carry the Android operating system. – End Quote

So here’s the thing- there’s a lot of Android devices out there, but people seem to just use them as a phone while iOS devices get used for lots of things.  I believe it’s because iPhones and iPads are much easier to use and much more reliable as a “pocket computer”.

On top of that Android apps are more expensive then their iOS counterparts.

There is something invaluable in Siri at this point.  Having voice commands to send texts, emails, make calls, pull up my calendar, schedule appt’s , etc – while I’m in the car, without ever even glancing at the phone – is a tool I can’t live without.  Android has nothing on this.

Also – resale value makes the iPhone a win-win.  At the end of a two year contract you can sell an iPhone for more then you paid for it, usually $300 or $400, and buy a new iPhone for $199 again..  Can’t do that with a plastic android device.

Last point – Apple’s genius bar.  Free face-to-face tech support by a trained technician (they are not sales reps, just techs) can save you time and stress when you need help.

As for which iPhone you should buy – go for the newest one.  It will last you the longest from today (software updates, processor speed) and have the most value in a couple of years when you are ready to trade up.


Not long after I began writing about cybersecurity, I became a paranoid caricature of my former self. It’s hard to maintain peace of mind when hackers remind me every day, all day, just how easy it is to steal my personal data.

Within weeks, I set up unique, complex passwords for every Web site, enabled two-step authentication for my e-mail accounts, and even covered up my computer’s Web camera with a piece of masking tape — a precaution that invited ridicule from friends and co-workers who suggested it was time to get my head checked.

But recent episodes offered vindication. I removed the webcam tape — after a friend convinced me that it was a little much — only to see its light turn green a few days later, suggesting someone was in my computer and watching. More recently, I received a text message from Google with the two-step verification code for my Gmail account. That’s the string of numbers Google sends after you correctly enter the password to your Gmail account, and it serves as a second password. (Do sign up for it.) The only problem was that I was not trying to get into my Gmail account. I was nowhere near a computer. Apparently, somebody else was.

It is absurdly easy to get hacked. All it takes is clicking on one malicious link or attachment. Companies’ computer systems are attacked every day by hackers looking for passwords to sell on auctionlike black market sites where a single password can fetch $20. Hackers regularly exploit tools like John the Ripper, a free password-cracking program that use lists of commonly used passwords from breached sites and can test millions of passwords per second.

Chances are, most people will get hacked at some point in their lifetime. The best they can do is delay the inevitable by avoiding suspicious links, even from friends, and manage their passwords. Unfortunately, good password hygiene is like flossing — you know it’s important, but it takes effort. How do you possibly come up with different, hard-to-crack passwords for every single news, social network, e-commerce, banking, corporate and e-mail account and still remember them all?

To answer that question, I called two of the most (justifiably) paranoid people I know, Jeremiah Grossman and Paul Kocher, to find out how they keep their information safe. Mr. Grossman was the first hacker to demonstrate how easily somebody can break into a computer’s webcam and microphone through a Web browser. He is now chief technology officer at WhiteHat Security, an Internet and network security firm, where he is frequently targeted by cybercriminals. Mr. Kocher, a well-known cryptographer, gained notice for clever hacks on security systems. He now runs Cryptography Research, a security firm that specializes in keeping systems hacker-resistant. Here were their tips:

FORGET THE DICTIONARY If your password can be found in a dictionary, you might as well not have one. “The worst passwords are dictionary words or a small number of insertions or changes to words that are in the dictionary,” said Mr. Kocher. Hackers will often test passwords from a dictionary or aggregated from breaches. If your password is not in that set, hackers will typically move on.

NEVER USE THE SAME PASSWORD TWICE People tend to use the same password across multiple sites, a fact hackers regularly exploit. While cracking into someone’s professional profile on LinkedIn might not have dire consequences, hackers will use that password to crack into, say, someone’s e-mail, bank, or brokerage account where more valuable financial and personal data is stored.

COME UP WITH A PASSPHRASE The longer your password, the longer it will take to crack. A password should ideally be 14 characters or more in length if you want to make it uncrackable by an attacker in less than 24 hours. Because longer passwords tend to be harder to remember, consider a passphrase, such as a favorite movie quote, song lyric, or poem, and string together only the first one or two letters of each word in the sentence.

OR JUST JAM ON YOUR KEYBOARD For sensitive accounts, Mr. Grossman says that instead of a passphrase, he will randomly jam on his keyboard, intermittently hitting the Shift and Alt keys, and copy the result into a text file which he stores on an encrypted, password-protected USB drive. “That way, if someone puts a gun to my head and demands to know my password, I can honestly say I don’t know it.”

STORE YOUR PASSWORDS SECURELY Do not store your passwords in your in-box or on your desktop. If malware infects your computer, you’re toast. Mr. Grossman stores his password file on an encrypted USB drive for which he has a long, complex password that he has memorized. He copies and pastes those passwords into accounts so that, in the event an attacker installs keystroke logging software on his computer, they cannot record the keystrokes to his password. Mr. Kocher takes a more old-fashioned approach: He keeps password hints, not the actual passwords, on a scrap of paper in his wallet. “I try to keep my most sensitive information off the Internet completely,” Mr. Kocher said.

A PASSWORD MANAGER? MAYBE Password-protection software lets you store all your usernames and passwords in one place. Some programs will even create strong passwords for you and automatically log you in to sites as long as you provide one master password. LastPass, SplashData and AgileBits offer password management software for Windows, Macs and mobile devices. But consider yourself warned: Mr. Kocher said he did not use the software because even with encryption, it still lived on the computer itself. “If someone steals my computer, I’ve lost my passwords.” Mr. Grossman said he did not trust the software because he didn’t write it. Indeed, at a security conference in Amsterdam earlier this year, hackers demonstrated how easily the cryptography used by many popular mobile password managers could be cracked.

IGNORE SECURITY QUESTIONS There is a limited set of answers to questions like “What is your favorite color?” and most answers to questions like “What middle school did you attend?” can be found on the Internet. Hackers use that information to reset your password and take control of your account. Earlier this year, a hacker claimed he was able to crack into Mitt Romney’s Hotmail and Dropbox accounts using the name of his favorite pet. A better approach would be to enter a password hint that has nothing to do with the question itself. For example, if the security question asks for the name of the hospital in which you were born, your answer might be: “Your favorite song lyric.”

USE DIFFERENT BROWSERS Mr. Grossman makes a point of using different Web browsers for different activities. “Pick one browser for ‘promiscuous’ browsing: online forums, news sites, blogs — anything you don’t consider important,” he said. “When you’re online banking or checking e-mail, fire up a secondary Web browser, then shut it down.” That way, if your browser catches an infection when you accidentally stumble on an X-rated site, your bank account is not necessarily compromised. As for which browser to use for which activities, a study last year by Accuvant Labs of Web browsers — including Mozilla Firefox, Google Chrome and Microsoft Internet Explorer — found that Chrome was the least susceptible to attacks.

SHARE CAUTIOUSLY “You are your e-mail address and your password,” Mr. Kocher emphasized. Whenever possible, he will not register for online accounts using his real e-mail address. Instead he will use “throwaway” e-mail addresses, like those offered by Users register and confirm an online account, which self-destructs 10 minutes later. Mr. Grossman said he often warned people to treat anything they typed or shared online as public record.

“At some point, you will get hacked — it’s only a matter of time,” warned Mr. Grossman. “If that’s unacceptable to you, don’t put it online.”