Tag Archives: Apple

Which is the best up-to-date FTP client to use?

If you’re a heavy user of the File Transfer Protocol (FTP), for example more than once a week and more likely on a daily basis, then how do you go about choosing your FTP client?

I’ve pulled up three very recent articles today on the most up to date rollouts and feature sets of FTP clients, hopefully that can help you determine which one suits your needs best. Whether you are a Mac OS user, a light user like myself, or a heavy user  familiar with Linux/Unix Command Line code.

FileZilla 3.7.0 improves FTP performance


FileZilla 3.7.0 improves FTP performance | How to Grow Your Business Online | Scoop.it
From betanews.com – Today’s news

Open-source FTP client FileZilla 3.7.0 and FileZilla Portable 3.7.0 have both been released. The new build now allows users to view the total transfer speed as a tooltip over the transfer indicators, and replaces the depreciated term SSL with TLS.

Juliana Payson‘s insight:

There are a lot of FTP Client Programs available to choose from for you to Transfer files, but one that stands out of the Crowd is “FileZilla” which is an FTP client that works on any operating system. It was started as a computer science project by Tim Kosse and two classmates. They decided to release the code for the public use, and they licensed it. There have been minor updates to the software today that improve it’s security. Continuous rollouts like this I’ve noticed from Filezilla make it a big choice of comfort for users like myself who probably use FTP clients no more than once a week.

If you’re looking for something a little more in-browser friendly, since you may already be maxing out processor usage with high tech desktop client software, then maybe FireFTP is the client for you.

 

FireFTP is a Powerful Firefox FTP Client You Can Use in Your Browser


FireFTP is a Powerful Firefox FTP Client You Can Use in Your Browser | How to Grow Your Business Online | Scoop.it
From www.makeuseof.com – 3 days ago

If you’ve ever done any sort of web management, then you’ve probably used FTP at some point or another. Most web hosts will have a primitive file uploader than you can use straight from your browser, but those are often a pain in the butt to use.

Juliana Payson‘s insight:
FireFTP doesn’t skimp on its feature set, which makes it a strong and viable alternative to other clients like WinSCP and FileZilla.

I used to be a big user of Firefox, and am also now inclined to use more cloud hosted software that can run from my browser opening up more of my laborsome laptop to more serious software applications. This seems like a great idea to me, except that I haven’t yet found a viable alternative for users that have switched over to Chrome. Please let me know if you find one!

In the meantime, here’s some awesome tips for Mac OS users:

Options for file sharing via SSH in OS X


Options for file sharing via SSH in OS X | How to Grow Your Business Online | Scoop.it

From reviews.cnet.com – 10 months ago

Apple’s Remote Login feature in OS X can be used for securely transferring files using several protocols. Read this article by Topher Kessler on CNET.

Juliana Payson‘s insight:

Topher, an avid Mac user for the past 15 years, has been a contributing author to MacFixIt since the spring of 2008. Topher presents a handy guide with screenshots to show you how you can access your server through the SFTP protocol. As with the SFTP protocol, using the command line to establish the connection may be cumbersome, but fortunately there is a tool called “Macfusion” available that can be used to store common server settings

Please point me in the direction of your favorite FTP clients in the comments below. – Juliana

 

 

 

Plesk / cPanel Passwords & Using a Random Password Generator

HostGator Cpanel Login  Screen

Both Plesk and cPanel have assistance tools for password generation. cPanel has its own random password generator. Plesk allows you to set password strength parameters that gauge new passwords and only allow new ones if they fit certain specifications you establish as the admin.

Beyond what’s available within these two control panels, anyone has access to random password generator tools – I’ll look at one of the best ones out there. This app is great for a simple generation of passwords for anything that’s outside your hosting environment and/or when you want to get access to passwords fast. Note that since Plesk does not have its own password generator, you need an alternative anyway. I’ll also discuss how to create a system for passwords so you can keep track of everything.

For this article, I’ll first look at Plesk/cPanel and then the specialized software that’s available. My main sources are cPanel, Parallels, and a piece by Stefan Neagu for MakeUseOf.

** I’ll also go over some of the best passwords out there – sort of an awards ceremony for password users throughout the world. To start out, I’d like to congratulate Becky Stephens from Minneapolis, Minnesota for her excellent PayPal password, I83&hh^^*ksj37dfiFGjer84438$$%ksajFhsaBdh483894#%$.

Plesk Password Generator? Heck No.

There ain’t no Plesk password generator folks. However, you’ve got other ways to get passwords, so, not a big deal. You can control passwords, though, to make sure all your passwords meet minimum strength requirements. Parallels recommends using higher security for passwords – so there perspective is to max out the security and forget the UX as far as this setting goes. Security is important wherever you go – be it for your home in the form of a burglar alarm installation or on the internet by using higher security passwords.

Keep in mind – you may want to achieve a balance between the ease of memorizing and strength of password security. You may get more support requests re: lost passwords. That’s just something to consider prior to making the passwords more difficult – surely folks will forget more. ** I want to commend Pete Blair of Oklahoma City for this incredible password for his Chase bank account, 298398sdSYfj$#%^#$%@hfjDh4t6R04C986$#^%#$%fuhsdf, which is difficult to guess but also very easy to remember.

Just to be clear what we mean by strength, that’s in opposition to vulnerability. If your password is “strong,” it is considered to be hacker-resistant. Really, though, hacker-resistance is a spectrum. The level of hacker-resistance will be established by these settings, allowing you to make it less likely that an attack against your system or a specific account will be successful.

In a nutshell, what strengthening your password means is making it longer and more complex – so, you’re going to need to stretch out the passwords and use more sophisticated approaches with numbers, symbols, and upper/lower case. The password, essentially, is going to look incredibly annoying and incomprehensible.

To adjust your password strength settings with Plesk Panel 11, go to Tools & Settings > Password Security > Password Strength. You can choose between the following five levels of strength: Very strong, Strong, Medium, Weak, or Very weak. (“Very weak” is what I always choose for my home security systems.) You can go for a strong or another level of password for the door lock system, depending on your home security and what amount of protection you desire to set up. You can also upgrade home safety by exploring various password-protected and digital locks.

Changing a setting within the application window will universally modify your parameters so that not all passwords are accepted. The system will keep spitting back a message to the user to strengthen the password, with instructions on how to do so, until one is submitted that is strong enough to meet the requirements.

Once you have adjusted the settings for password strength, no one using the system – whether that is a customer or reseller, the admin or an auxiliary user – will be able to create a password that exists outside of your minimum guidelines. This also applies to all scenarios – email, FTP, whatever – as well as at the inception of the account / original password generation and changes to it at any point. Adjusting the password strength will affect new passwords that are established, but not the ones that are already active.

** Rebecca Townsend of Toronto, Ontario, also has an incredible password for her Apple account: Efoh43098D53G048jkfs&^%^%$$#^^#sdfjDhosSdfkjh576&^%. Rebecca’s password, rather than being generated with a software program like many of the others I’m praising in this piece, came to her in a dream. The dream was mostly about ice cream, but the sprinkles in the ice cream spoke the password one character at a time.

cPanel Password Generator? Well, Sure.

There is a random password generator tool in cPanel – it’s called, nonsensically, Password Generator. The button is not always present – it sometimes likes to be unavailable. Sometimes it’s shy. But don’t let the tool’s occasional shyness convince you that it is not the sexiest functionality in the entire cPanel system.

To use the Password Generator, just click it. You’ll see a password immediately pop up within the tool. You don’t have to take that particular one. You can keep clicking Generate Password until you see one you like. If you click it several billion times, you will eventually see your mother’s maiden name.

You can change the parameters for the password too. In Advanced Options, you can select and check boxes for inclusion or exclusion of the different types of characters and cases. Length of the password can be determined as well.

Once you’ve determined what the password is, check the box to indicate that you’ve written it down in a safe physical location or that you have saved it in a secure database. Here are Mac and Windows systems for password storage:

Once you’ve got the password you want, you can use it on the page in cPanel if you want by clicking Use Password – which also closes the tool. You can also close the window without using it – allowing you to use the app for generation of passwords for external accounts if you like.

** Patty Iverson of Albuquerque, New Mexico, has a fantastic password for her Facebook account. It’s bhFgh9E008342%$%D$%$sddfkSjhsdEgo867$%fjheiu%$&4. Great job, Patty. Patty has her passwords written down on a paper coffee cup that she keeps behind the Tupperware in her kitchen cabinet (the one at eye level just to the left of her sink). Weird right? Great idea. The key to her apartment, if you need it, is under the cactus to the right of her front door. Take a look at those passwords.

Considerations for Use of Random Password Generators

OK so we are going to look at a random password generator. Prior to exploring it, though, let’s think about what we need from one of these tools. The following considerations were mentioned by Stefan in his MakeUseOf piece.

  1. How long is it? As discussed above, you want to know the tool you’re using gives you a long password. That’s just a basic way to keep it from being guessed.
  2. How entropic is it? Per the Free Online Dictionary, entropy indicates the amount of “disorder or randomness in a closed system.” It seems strange at first to be going for randomness and disorder with your security, but that complexity with make it easier to evade intrusive maneuvers by criminal parties.
  3. Do you trust the provider? You need to have knowledge or faith that the organization behind the tool you are using does not store your information or have a backdoor. It’s not much use to utilize a system that can itself get invaded. Is the transmission secured? You want an online password generator, for instance, to have SSL encryption (HTTPS protocol).

Bradley Thomas of Newark, New Jersey, is using an incredible password for Windows: sdSlk4509w8D90ekdsg&#$ED%3jsakhXUfdjlk6$##$klEaslCkjddlkj32W$#%S790sfXkUl35#$%#45skike56. If you are ever away from this piece and want to remember it, it’s written down on a piece of paper in his wallet. If you’re able to get the wallet, you can go ahead and throw away the pictures of his children and buy some gifts for your own children with his credit cards. If you use the Delta card, it will increase his frequent flyer miles, which is really the least you can do.

Password Generation & Storage: Perfect Passwords & IronKey

Per Stefan, Perfect Passwords is the best solution out there for standalone pass-gen software. This software was created by Steve Gibson, who has an incredible reputation in the programming world and a career of accomplishments to back up his ability to create an application you can trust.

An SSL certificate secures the connection as the passwords are being created. The software runs three strings simultaneously, each of which has 63 or 64 possible components. You can choose how to mix and match the strings. This system is complex, which in turn creates passwords that are highly randomized.

Get an IronKey thumb drive. An IronKey device is itself password protected – and all files and data on it are encrypted as well. The drive will wipe itself clean if anyone attempts to take it apart by hand or after ten incorrect passwords are tried.

The IronKey drive comes with a GUI password administrative app and a secure browser. Passwords are only on the screen: they don’t ever get typed in or go through unsecured third-party software.

Aside from the IronKey, Stefan stores some passwords in an Excel file – one column containing the account to which they correspond, the other containing the password. He keeps the file in his Google Drive.

Stefan’s Google password, by the way, is 32AH0984sfkjkj45R609#$%#$34sEdflkjUsdfl0$SO%^$SSfja#@S$fd.

Summary & Conclusion

If you are using Plesk Panel, be sure to strengthen the parameters so that when new passwords are created or when they are changed, strength – both length and entropy – is mandatory. If you are using cPanel, you can use its random password generator to create passwords – or you can try out Perfect Passwords.

Regardless what system you are using to create passwords, IronKey is an option if you want to store your passwords securely and have them on a device you can use anywhere. You can also keep your most important passwords in the comments below this piece – though that is probably not a good idea. So, if you are a precocious seven-year-old and don’t quite understand what I’m talking about, don’t place all your passwords in the comments. I could probably get sued, especially if I use them to gather information about your family and break into another suburban home. It’s time for a change.

by Kent Roberts and Richard Norwood

We are looking for a programmer with 10yrs experience with the iPad

But the iPad hasn’t been around for ten years!

Not just C++ programmers – John Cook | Google+

John Cook - Google+ - Not just C++ programmers. | How to Grow Your Business Online | Scoop.it

From plus.google.com – Today, 1:08 AM

John’s advice: Never talk to an HR department. Talk directly to the people you’d work for. Send them your resume etc. Only talk to HR when it’s time to fill out your paperwork after you have a job offer.

John goes on to say (And the discussion is pretty hilarious):
As far as 10 years iPad experience, There are many analogous job descriptions. For example, an ad looking for 5 years HTML experience before HTML was 5 years old. Also seen the opposite; asking for experience with obsolete or irrelevant technology. Don’t take job descriptions too seriously. If a job sounds like a good fit, don’t worry if you don’t have one of the requirements.

 

Tips To Hire Veteran Php Programmers with Off-the-Shelf solutions to meet Atypical Business Needs

Tips To Hire Veteran Php Programmers with Off-the-Shelf solutions to meet Atypical Business Needs | How to Grow Your Business Online | Scoop.it

From hirephpcom.wordpress.comToday, 3:31 AM

Essence of php can be felt in almost each and every corner of the web. It has vigorously stormed the market of web development and has highly streamlined the methods by which bespoke websites are developed.

Juliana Payson‘s insight:
Being open source in nature, PHP not only reduces your overall development cost but also offers your business a crucial thrust necessary in today’s competitive world. I have personally met the challenge of looking for assistance to develop small business websites. It’s not easy! One search for experienced web developers and you are faced with hundreds of coders. Even on a platform like Elance, you may not be the best project manager who understands the details of your own project. My advice, is to find a project manager or consultant to oversee the individual tasks for you. This allows developers to work efficiently on the job without having to educate you on their process at the same time.

The Importance of Non-Programming Programmers

English: A wireframe document for a person pro...

From infolific.com – Today, 3:42 AM

What’s the solution for the lack of expertise across each phase of programming? The non-coding programmer. Non-coding programmers are people such as requirements analysts, GUI designers or graphic designers, testers, etc. They’re good at the things programmers are told they should pay attention to, but don’t really want to deal with and aren’t very good at.

Juliana Payson‘s insight:

Programmers enjoy coding mainly, not learning how to create a drop-shadow or bevel for good looking icons. Programmers also enjoy learning development platforms, not how to make things ‘pop’. I have a vague understanding of code and know how it kind-of goes together. I would be considered as a non-programming programmer who is the common ground between client and programmer, like a project manager. This doesn’t mean I have to be a techie, far from it, it simply means I probably suck at coding, but can interpret what a client needs and diagrammatically relay that as task lists for the resource of Coders. On a small business scale, a non-programming programmer can be your Graphic Designer, Project Manager, or Virtual Assistant.

Are you in need of a Non-Programming Programmer? Or indeed real project development on your website? Give this article a shout out if it helped you understand what type of person you need to hire. – Juliana

 

 

 

The MacBook Air

MacBook AirApple’s latest release follows the standard formula that has been so effective for the last few years. We touched on the MacBook Air in a post about MacWorld 2008 last week, but all we had was a link to the ad and the guided tour. Having read more about the new notebook, we can offer more information for those interested.

The Air does seem to be the thinnest notebook. The well planned unveiling of the Air, removing it from a standard office envelope, illustrated that point quite well. At its thinnest, the Air is a slender 0.16″ (4mm). That measurement balloons to 0.76″ (~19mm) at it’s thickest point near the hinges, measurements that even make Kate Moss look like she belongs on The Biggest Loser. For comparison, Dell and Sony have notebooks that measure 0.8″ (~20mm) and 1.0″(~25.5mm), respectively. The Air is also quite lightweight, tipping the scales at an amazing 3lbs (1.36kg).

So, the Air is light and skinny, which is great, but what can it do? The Air is available with Intel Core 2 Duo chips (1.6-GHz or 1.8-GHz for $300 more) that were specially built at Apple’s request. The chips are in the Merom family of Intel chips. Along with the unique chip, there are other aspects of the Air that are unique; not only can you not upgrade the memory, but the battery cannot be replaced by the user. These are side effects of the slim design. The 2GB of RAM should be sufficient for the lifespan of the notebook, probably around 2 years or so, but many users will shy away from the Air when they find out they can’t take advantage of a second, back-up battery for extended portable/remote use.

Built for wireless, the Air has taken away some standard ports, like Ethernet (who needs to plug in to a LAN, right?), and according to Jobs, optical drives are a thing of the past. No DVD/CD-ROMS on the Air. With the Remote Disc feature, the Air can connect to another MacBook and use the optical drive on that system for software installs or load tunes.

It’s tough to say who this device is for. It cannot hook in to a standard office network, which at this point, are still typically wired. Remote users can’t go a full 8 hour day using the Air, and even if they could, they would be unable to burn their results to a DVD to back-up, share, or ship what they’ve been working on. A trendy student might be interested, hoping to minimize the bulk in their backpack, but it’s a bit pricey for the average learner living off a dorm room budget.

This type of innovation is the start and will help promote smaller, thinner devices and help bring the cost of these devices down, but personally, I wouldn’t be an early adopter. The sacrifices made for the sake this waifish devices are the same reasons I wouldn’t be interested. For more information on the MacBook Air, see the Computerworld FAQ: Everything you need to know about the MacBook Air.

Mac OS X Leopard (10.5)

Mac Leopard (OS X 10.5) logoIn recent years, Apple could almost be described by two things: turtlenecks and iPods. This year, the iPhone was added to the mix, and we saw another addition to their family of felines, Mac OS X 10.5, better known as Leopard. The family of Apple felines has now reached six, starting with Cheetah, moving to Puma, Jaguar, Panther, and Tiger before this latest release. The OS X operating system started the resurgence of Apple, and while it has been over 2 years since a release has been made, many of the over 300 changes will surely go unnoticed by the average user. Touting one of the most impressive interfaces, the latest release has a refined look, revamped apps and new options. While the release doesn’t seem to have the fanfare of Microsoft’s Vista, which recently hit the 88 million unit mark, it should have an impact on Apple through hardware upgrades as well as OS upgrades. For an in-depth look at the new OS, see this article on Computerworld.

Check out these other articles for more information:

FAQ: Getting ready for the leap to Leopard

Five reasons not to make the jump to Leopard – yet

Image Gallery: First look at Leopard

Last 10 Years: Apple’s Dell-ivered

Ten years ago, Dell was virtually the king of the computer Industry, and from that throne, Michael Dell made a brash remark at ITxpo97. He was asked what he would do if he were the CEO of Apple:

“What would I do? I’d shut it down and give the money back to the shareholders.” (link)

Obviously making a statemtent like that has the potential to come back and bite you, especially when making it about a company that had been so important to its industry. Although Apple’s resurgence can largely be attributed to the success of the iPod and their trendy, aesthetically pleasing designs, major improvements were made in the hardware and software platforms. The first step was the upgrade from OS 9.x to OS X, and a few years later that was followed by the announcement that all Apple computers would use Intel microproccessors.

In the last 10 years, Dell has become stale and Apple has become stylish, and while I don’t imagine Steve Jobs will make suggest that Dell shut down, he might suggest that Dell take a look at some of the creative and innovative moves that his company has made in the last 10 years.

Apple vs. Dell: 10 Year Stock Comparison