SLee and Topher

Two Guys on Gaming, Tech, and the World

How RFID Chips Are Making Your Identity Harder to Protect

October 12, 2011 By Topher Leave a Comment

How RFID Chips Are Making Your Identity Harder to ProtectYou might be surprised to find out what common products now have RFID chips in side of them.  RFID stands for Radio Frequency Identification and most commonly used on toll roads for collecting your credit card information as you pass through the toll without having to come to a complete stop.  This has made driving on toll roads much more convenient, but that same technology can pick up an RFID signal from over 300 feet away.  In fact, you might even have other RFID chips in your car that those same scanners could pick up and someone could find out more about you than you want them to know.

RFID chipDid you know that many driver’s licenses and passports have RFID chips inside them too.  This means that anyone with an RFID transmitter (which can easily be picked up on eBay) can find out who you are from the distance without even having to bump into you.  The way it works is the transmitter will send a special signal to the surrounding area, and if any RFID chips are in the vicinity it will send back a ping along with the information it contains.  Some crooks are using the RFID chips in your car keys to get access to your car while you are shopping.  This is usually a two man team and it is much more high-tech than other forms of car theft, but it still happens.  It should be noted that car’s with RFID ignition systems have had a 90% reduction rate in car thefts, but don’t think you are not vulnerable just because you have such a vehicle.

RFID chips are even commonly found in car tires today.  This technology allows car owners to monitor the tire pressure in their cars, but the RFID signal also contains the car’s VIN number and you can be tracked by the simple signal coming out of your tires.  The vulnerability here is that the VIN number on your car is connected to your name and personal information about the vehicle, and someone with the right RFID tools can freely get all of that data without any trouble.

Many retail stores are contemplating using RFID technology to keep track of inventory as well.  This means that jeans and shirts will soon have RFID chips so an employee can just scan a shelf at one time and know exactly what is left and what needs to be ordered.  The problem is that if retail stores have RFID scanners in them, they can essentially be scanning customers as they walk around and find out their identity through their driver’s license.  They will know the names of people in their store who have not even purchased anything yet.  This might seem innocuous to you, but remember that many identity thieves have this same technology.   And if these RFID chips remain on the jeans you just bought, that chip will be able to get picked up when a criminal passes by your house, even if you threw it out and it’s sitting in the trash.  The thief will know that you just bought a pair of $100 jeans.

Top image by ZapTheDingbat
RFID image by midnightcomm

How to Fix a Slow Mac

October 10, 2011 By Topher Leave a Comment

Slow Mac? Optimize it fast.No mаttеr how goоd а Maс іѕ, thеrе will cоmе а time when it gеts ѕluggіѕh. Whеn thіs haрpens, уou wіll nаturally wаnt to find an еffеctіve wау of fіxing it.

Resource-intensive programs are the moѕt common reason for a Mac ѕlоwіng down. In this сaѕе, removing the progrаm оr upgradіng your ѕуѕtеm maу bе thе best wayѕ of fіxing a slow Maс.

Another possible rеаson for a Maс getting sluggіѕh iѕ when а number of prоgrams tаkе uр large аmountѕ оf уоur сomрuter’s RAM. Fіxіng a slоw Maс wіll thеrеfоre rеquirе freeіng up some vаluablе ѕpaсe in yоur RAM. Whеn уour Mac bеgіnѕ tо slow dоwn, thе moѕt commоn сulpritѕ аre thе sо-callеd mеmory hogs. The best methоd for fіxіng a slow Mac iѕ to kill thеѕе mеmоrу hоgѕ. And while therе аrе several differеnt wауѕ оf fіxіng а slow Mас, уou wоuld nаturаllу wаnt to foсuѕ on thе ѕіmрlеst and lеsѕ time-сonѕumіng. Fоr thіs rеason, wе іntroduсe yоu tо thе MасKeереr by ZeoBIT.

The Clеan Up And Sреed Uр App Thаt Delivеrs Rеsultѕ

MaсKeерer haѕ bеen dubbеd as thе 911 fоr your Mас beсauѕе іt doеѕ mоrе thаn sіmрly fixing a sluggіsh Mас. In fact, іts prоbаblу all yоu nееd tо keep уоur Mаc sаfе аnd running in perfeсt conditіon. Fіxing a slow Mac iѕ vеrу fаѕt, sаfe, and еаѕу wіth the MaсKeeреr. In јust onе сlіck, thе рrоgram will ѕсаn уоur hаrd dіsk for mеmorу hоgs that аffеct уour Mаcѕ pеrformanсe. Oncе these mеmоrу hogs аrе identіfіеd, уоu mаy thеn рrоceеd tо thе next ѕteр іn fіxing a ѕlow Maс, whіch is removing thе culрrіtѕ frоm yоur ѕyѕtеm. By simрly cliсking on thе Rеmоvе button, уou can ѕaу goodbye tо thе mеmory hogs аnd hellо tо а fаѕtеr Mас.

Oрtіmіzе Yоur Slow Maс FAST

Aside from rеmоvіng mеmоry hogs, the MасKееper alѕо hеlps in fixing a Maс that is running оut of stеam wіth іtѕ орtіmіzаtiоn feаture. Thiѕ feature іncludes аn uninѕtallеr that mаkеs ѕurе unwаnted files are cоmplеtelу rеmovеd frоm yоur ѕystem. It аlso has an updаte tracker that lets yоu know whеn cеrtain progrаmѕ neеd to bе uрdаted. Kееріng apрlісаtiоns up-tо-date іѕ аlѕо еsѕеntial іn fixіng а ѕlоw Mac beсаusе outdatеd ѕoftwarе оftеn cаuseѕ уоur Maс to ѕlоw dоwn as wеll.

And аs рrevіоusly mеntiоnеd, thе MacKееper dоeѕ mоrе thаn juѕt fіxіng a ѕlow Mаc. It alsо has ѕоmе vаluablе ѕeсuritу feаturеѕ that уоu wіll surеly apрrесiаtе. Fоr оnе thing, the MасKeeреr can keep уour Mас proteсtеd frоm hаrmful fіles thаt mаy pоse а threat to your privaсу. What’s the uѕe of fixіng a slоw Mac іf you саn’t kеeр іt ѕаfе, rіght? With thіs in mіnd, уоu’ll аlso apрreciatе thе anti-thеft ѕеrvісe providеd by MaсKеeреr. This fеature allows you tо traсk thе lоcatіon of a ѕtоlen Mac and takе а snарshot оf thе thіеf — very hеlрful indeеd fоr rеcоvеrіng а stolen Maс. So, thе nеxt tіmе уоu fеel the neеd fоr fіxіng a slоw Mас, ѕtоp loоkіng for cоmpliсatеd sоlutionѕ. Juѕt downlоаd the MacKeерer аnd ѕtаrt fixing a slow Mаc and keеріng it ѕаfe аt the sаme time.

Fix a Slow Mac
Sign up here to speed up your Mac.

How to Save on Texting Fees for Smartphone and iPhones

October 7, 2011 By Topher Leave a Comment

Save on Texting FeesCell phone companies are making bank off of the text message packages that people are being required to purchase as a part of their plans. Not only do smartphones need a data plan for internet usage, but they must also add a text plan, if they are avid messengers that is. Most teenagers will definitely fall under this category. All of these messaging, minutes and data costs can add up. So how can you lower your phone bill and still be able to be involved in the “texting” generation? Here are a few options you can use for you Smartphone or iPhone that will help you save money on all of those texting bills:

**As a note before reading any of these, be aware that most will require that you get a second phone number, usually acquired for free through whichever service you choose.**

Google Voice

Google Voice is an excellent service for making any and all phone calls/text messages for free on both Android phones and iPhones. Unfortunately, if you already have a cell phone number, you will have to get a second Google Voice number, as with most of the services below. If you can make it happen, give all your friends and family your Google Voice number. With this number, you will not only be able to send and receive text messages, but all phone calls will be automatically forwarded to your normal cell phone number. All domestic services are free. International services are also available at a low rate.

Skype

Skype, one of the most popular online phone systems, also offers texting services. Unlike Google, they charge a fee of 4.7¢ per message, which is still about half of what a pay-as-you-go phone would charge. With Skype, you can send a message from the computer or a mobile device that has a Skype app. Then you will receive responses in your regular Skype chat window.

Text+ for Apple

Don’t be fooled by the + sign in the name, this texting and phone service is made for Apple. Although, it is very similar in function to Google Voice. You can get a free Text+ number and use it to make and receive phone calls and text messages on any of your apple devices, including the iPod touch. However, if you are using anything but an iPhone, you’ll have to wait until you are within range of a wireless connection to receive any of your messages. A great free option, but dependent on internet reception or having an iPhone.

The biggest challenge to overcome when trying to find a way to lower your phone bill is the issue of balancing two phone numbers. It can be a real pain to change your number and inform all of your acquaintances of the change. However, if you analyze the people with whom you pass the most texts, you might be able to inform them of the change. That way, you can switch over to a free texting service for your Smartphone or iPhone with the people who are using up most of your texts/minutes. This will reduce the number of paid-for texts you receive on your phone and allow you to lower the limit on your text messaging plan or having a lower bill if you are on a pay-per-text plan.

Top image by katerha.

5 Security Tips That Could Save Your Server

October 6, 2011 By Topher Leave a Comment

Secure Your ServersSecuring a dedicated server or VPS is an ongoing process that can sometimes be overwhelming. Just as quickly as you find ways to keep would-be attackers out of your server, they look for new ways to get in.  Above all else, it is important to be proactive and always look for ways to improve your server’s security. The following are 5 tips that should help you keep your server safe.

1. Secure Web Applications

A common mistake for new system administrators is to place too much emphasis on network security while ignoring the rest. No doubt, it is important to have a good network firewall in place, but it will not save your server from attacks aimed at open network ports, especially your web server.

On any Internet-connected server, the most vulnerable points are those which must be exposed to the outside world. The web server is always susceptible to attacks because anyone on the web can access it. Therefore, it is important to keep it patched and secure your web applications and server-side scripts. All it takes is one security hole in a PHP script to expose your entire server. One way to lessen the sting is to install a web application firewall like the free and open source ModSecurity.

2. Install Intrusion Detection

It is conceivable for people to attack and invade your server without you even knowing it. Think of your server as a compound with multiple borders to defend. A single person can probably find a hole in the fence to sneak in unnoticed. With surveillance at every point, however, you will at least know when someone attempts an intrusion.

Intrusion detection software, such as Brute Force Detection, can alert you whenever someone attempts to sneak into your fortress. Many of these solutions will also take measures to keep those attackers from finding ways into your server.

3. Monitor Everything

It is easy to sit back and hope no one attacks your server, but by actively monitoring it, you can often prevent attacks before they start. Monitor your network, web server, database server, mail server, operating system, an any other vital systems. You can do this by watching the system logs with a tool like logwatch and by using advanced scanning tools like OpenVas vulnerability scanner.

Some monitoring tools will even notify you of problems via text message to your mobile phone. By monitoring your server, you can often pick up on threats and potential attackers before they cause problems.

4. Get Help

I managed Linux servers for many years, but I still do not consider myself anywhere close to being a security expert. Acknowledging that you do not know everything is an important realization because it allows you seek help from others. The web has opened up many possibilities for free support with forums, blogs, and even video tutorials offering server security help. Even if you cannot afford to pay for help, there are plenty of free and inexpensive options.

If you can pay for help, however, it may save you a lot of time and grief to hire security consulting. Just make sure you do your homework and choose a consultant that will actually help your situation. If you know before getting your server that you will need a great deal of help, you might want to consider getting a managed server from your web host. The best web hosts will offer a wide range of managed server options.

5. Manage Users

Finally, and most importantly, you need to manage your users. All of your other security measures will be for nothing if you have users with weak passwords and unsecured scripts. Therefore, you should enforce strong passwords and require users with direct access (such as SSH) to change them periodically. For web hosting clients, make sure they keep their scripts and web applications updated. You may be able to help them by providing automatically installed scripts. Use your best judgement, and always look out for users who may have nefarious intentions.

Server security takes a lot of work, but it is possible to have a secure server without spending a lot of money. Avoid the reactionary approach. Take the time to do it right and be proactive, and you should be able to keep your server safe.

Top image by Jamison_Judd.

How to Secure Your BitTorrent Downloads

October 5, 2011 By Topher 1 Comment

BitTorrent

The media often associates BitTorrent with illegal file sharing, but there are legal uses for it as well. Unfortunately, some Internet service providers (ISP) have placed bandwidth throttling restrictions on torrent downloads or even blocks on torrent trackers, preventing legal downloads right along with the illegal ones. But there are ways to still get quality torrent downloads, protect your online identity, and make sure your downloads are secure.

1. Encryption

Most torrent clients support encryption, which makes it difficult for prying eyes to see exactly what you are downloading. Not all peers may have the ability to connect with your encrypted stream, but most will. The headers and the stream will be encrypted, preventing your ISP or others from knowing that the data you are transferring is coming from torrent downloads or uploads.

As a result of this encryption, you will be able to work around any bandwidth shaping or throttling that your ISP may have in place. It is important to note, however, that this will not make you anonymous to torrent trackers or peers. Therefore, illegal downloads can still be monitored.

2. Port Forwarding

The BitTorrent protocol has certain common ports that most clients use. In an effort to slow down illegal movie and music downloads, some ISPs may block these ports. In order to still get your legal torrents through, you can tell your router to use a different port and forward it to your computer. You can even randomize the port in your client, such as uTorrent or Transmission so that your client will use a different port each time it starts. Then, enable UPnP (Universal Plug-N-Play) on your router to make sure it detects your BitTorrent client and gives it access to the Internet.

3. Block Spying Peers

Some people and organizations monitor torrent trackers and set themselves up as fake peers. They connect to you when you start downloading and then have your IP address. Again, if you are doing nothing illegal, you may have no reason to care, but if you are particularly paranoid, you can use a tool like PeerBlock or a filter list from organizations that keep track of bad peers. This can also increase security, as it prevents peers who might send harmful files from connecting to your computer.

4. Automated Limits

Something that has become increasingly important in BitTorrent optimization are download limits, especially now that ISPs like Comcast and AT&T are instituting bandwidth caps. While. you want to be a good file sharer and seed torrents for as long as you can, you cannot afford to have people connecting to your computer 24/7 at the highest speeds. Most BitTorrent clients have settings to limit download speed, the number of simultaneously connected peers, the number of files you want to seed, and even the time of day you want files to be available.

5. VPN or Proxy

If you are extremely concerned about keeping your torrent downloads under the radar, a VPN or proxy is the ultimate solution. With either solution, your torrent downloads will be hidden completely, including your IP address. Most good VPN and Proxy services charge subscription fees, but some of the best are fast and secure, making them worth the investment. If you live in a country that is particularly anti-torrent, even against legal torrent downloads, a VPN or proxy will protect your digital rights and keep you safe. Some Internet users also find it very important to stay anonymous, no matter what they do, and may use VPNs or proxies for web browsing, emails, and all other general Internet usage.

Why It Is Important

Beyond illegal file sharing, many free and open source software projects, such as Linux distributions, use BitTorrent to distribute their programs, effectively lowering bandwidth costs. Some organizations even share legal movies, such as “Sintel”, the Durian Open Movie Project and “Big Buck Bunny”. Moreover, many indie game developers also use BitTorrent to distribute their games.

When ISPs indiscriminately hinder torrents without regard for their legal uses, net neutrality is in jeopardy. That is a situation that would be bad for all parties involved and one that we should collectively strive to prevent.

5 Reasons You Should Be Using OpenDNS

September 23, 2011 By Topher 1 Comment

OpenDNSI love the internet. I really do. Few things make me happier than when I’m online and everything is going like it’s supposed to.

Unfortunately, things don’t always go the way they’re supposed to on the internet. It can be slower than expected, you can be tricked into some pretty crafty phishing schemes, or you (or your kids) can stumble upon some pretty nasty content. Despite all the internet’s perks and all the pleasure you, I, and billions of people across the globe can derive from it, situations like these can be terrible.

But there is good news. There are internet superheroes fighting for a better online world.

Though they might seem outnumbered by all the bad guys and technical difficulties we face online, these internet superheroes fight harder and harder to make this web faster, more secure, and more informative.

OpenDNS is one such superhero. Calling itself “The fastest-growing Internet security and DNS service,” and with over 20 million clients, OpenDNS uses some pretty amazing technical mojo to make web browsing a better experience.

So, “how does it do this?” I’m glad you asked. Put simply, by allowing users to access the internet through special DNS servers instead of the ones provided by users’ internet service providers (ISP), OpenDNS increases performance and adds features that your ISP can’t or won’t.

(Click here for more information on DNS.)

Let me break it down a little. Here are 5 reasons you should become one of OpenDNS’s 20+ million [Update] 30+ million clients.

1. The Internet is Faster with OpenDNS

DNS servers are computers. Like all computers, there is a limit to how much “work” a DNS server can do at any given time. If you are using your ISP’s DNS servers (which by default you probably are), your ability to quickly resolve web addresses is directly linked with (and limited by) the speed of that server. More people using that same server means a slower connection for you.

OpenDNS is superior to your ISP’s DNS server because that’s its job! OpenDNS specializes in having the best, fastest DNS servers — unlike your ISP who has a million and one other things to worry about.

2. OpenDNS is More Reliable Than Your ISP

When you are dependent upon your ISP’s DNS server, you are putting your internet connection at unnecessary risk. If that DNS server crashes you would be unable to navigate to any websites by URL and would only be able to surf by IP address (because I know you have those memorized, right?).

I used to work for an ISP, and while this was not a common occurrence, those DNS servers did go down more often than you would hope. Believe me, trying to be online without a working DNS server is no fun at all.

OpenDNS also uses a system it calls “SmartCache” to create a more reliable internet. SmartCache detects some website failures and will help you get to the page you want in spite of those failures. Do you think your ISP can do that?

3. OpenDNS Offers a Safer Internet

In addition to its amazing reliability and speed, OpenDNS also puts a premium on security. It also runs the authoritative anti-phishing site PhishTank.com. This thorough knowledge of nefarious phishing sites is like a tool in OpenDNS’s tool belt that it uses to fight for your security online, preventing these sites from loading.

The anti-phishing service is so powerful that OpenDNS can rightly claim:

Our phishing protection is so good that companies like Yahoo!, Microsoft and Facebook look to us to help protect their customers.

 4. You Can Track Internet Statistics with OpenDNS

When you sign up and get your network online with OpenDNS, you can start keeping track of your internet usage like never before. Simply log into the OpenDNS dashboard, and you can view months and months of data on the domains and IPs you requested, the types of requests, and much more. The easy-to-read graphs make it easy to understand and conceptualize how you have been using your internet connection.

5. OpenDNS Offers a Robust Set of Parental Controls

Aside from all the malicious websites in the world today, there are legitimate sites that offer content that is inappropriate for children. Perhaps you don’t want to subject yourself to such material either. While there are programs that can be installed on a computer to help contain access to such sites, they are limited in their functionality.

  • These software suites can be frustrating to install.
  • They are only effective on the computer you install them on.
OpenDNS surpasses these software-based solutions by allowing you to control your entire network. Adjust the settings on your router, set up the controls you want on the OpenDNS website, and your settings take effect immediately, on every device connected to your network whether it’s a computer, mobile device, or gaming console.

 

If a faster, more reliable, and more secure internet sounds good to you — and I don’t know why it wouldn’t — there is no reason for you to miss out on this great service. And don’t think that cost is an issue: the basic home plan is absolutely FREE. If you want to use OpenDNS for your school or business, there are cost-effective options for that as well.

 

What are you waiting for? Let OpenDNS be your internet superhero today.

For help getting started, be sure to check out their Knowledge Base.

If you are a “visual learner,” here is an infographic OpenDNS published in honor of its fifth birthday:

 

OpenDNS Infographic

Google Releases First API for G+

September 16, 2011 By Topher 2 Comments

Google Plus API

Google Plus Evolution

Image by cambodia4kidsorg

In social networking news, Google announced and released on Thursday (9/15/11) the first application programming interfaces (API) for it’s social network Google+. [Read more…]

Amazon Improves Features in the New S3 Release

September 2, 2011 By Topher Leave a Comment

Amazon Web Services Amazon Web Services announced improved features for the Amazon Simple Storage Service (S3) today. Here are the three improved features in the new S3 release.

Folder Upload

Prior to the update, users had to upload files individually. Now, if you have an entire folder that you want to add to your S3 bucket, you can add the entire folder at once

“Jump”

Amazon enhances navigation speed in the S3 interface with its new “Jump” feature. When moving to a new object or folder, the new S3 update will narrow the possible results as you are typing — only objects or folders that start with the letters you type will be displayed, helping you find what you are looking for faster.

Access Sans Adobe Flash

With previous versions, access to S3 was limited to platforms with Adobe Flash. Now platforms without Flash can access the service, creating an added security benefit: the only open port required for connection is port 443 — the standard port for secure connections.

 

These features in the new S3 release are live and ready to go. Access your S3 buckets here to take advantage of these improvements. If you are not using AWS S3 yet, you can learn more about it here.

Future Changes for Google’s Android App Inventor

August 30, 2011 By Topher 1 Comment

Android vs. Alien

Users of Google’s Android App Inventor were greeted today with an email from Google outlining immediate and future changes to the service.

In addition to an immediate change to the URL, Google states that by the end of the year it will no longer be supporting the service.

While your projects are safe for now, App Inventor users will need to retrieve any data that they want to save before the end of the year when MIT’s Google-funded Center for Mobile Learning will take the reins.

In case you accidentally discarded the email, here it is:

Dear App Inventor User,

As a result of the recent changes to Google Labs and App Inventor, effective immediately, the URL for App Inventor will change from appinventor.googlelabs.com to appinventorbeta.com. This URL change WILL NOT have an impact on your projects stored in App Inventor.  All data that you see in your appinventor.googlelabs.com account, as well as documentation and email forums will be available at appinventorbeta.com.

As we announced on the App Inventor Announcement Forum, Google will end support for App Inventor and open source the code base at the end of this year.  Additionally, in order to ensure the future success of App Inventor, Google has funded the establishment of a Center for Mobile Learning at the MIT Media Lab, where MIT will be actively engaged in studying and extending App Inventor.  This transition will happen at the end of 2011.  At that time you will need to download your data from appinventorbeta.com in order to continue working with it in the open source instance of App Inventor.  In the coming months we will send you detailed instructions on how to download your data.

Please visit the App Inventor user forums to get future updates on App Inventor.

The App Inventor Team

© 2011 Google Inc. 1600 Amphitheatre Parkway, Mountain View, CA 94043

You have received this mandatory service announcement email to update you about important changes to your App Inventor account.

Top image by JD Hancock

If you are interested in making your own Android apps, you can get started quickly with Android Apps for Absolute Beginners through my referral link. Even if you don’t have any experience programming or making apps, this book will get you started in this growing market. Click here to get it on Amazon.

Linux OS for Mac: Does a Penguin Conquer a Lion?

July 20, 2011 By Topher 2 Comments


Linux OS for Mac

A Ferocious Lion or a Friendly Penguin: Which Would You Choose?

With the release of Mac OS X Lion, the world of Mac owners have yet another chance to throw their hard-earned cash into the virtual hands of Steve Jobs through the ever-so-convenient Appstore. But that’s not the only option. Instead of coughing up $30 bucks, it might be worth your while to consider a Linux OS for Mac.

Why Blaspheme the Deity of Steve Jobs with something as lowly as Linux?

Though it may seem odd, as it certainly does for many hardcore Mac fans, a Linux OS for Mac can be quite a compelling concept. Here are three thoughts to ponder.

A Linux OS for Mac is Free; OS X is Not

With the flashy (albeit well-done) marketing and all the media coverage Mac OS X Lion is getting, it might seem like a no-brainer to opt for the upgrade. And though the cost of entry is low (approximately $30 USD), it’s infinitely more expensive than many flavors of a Linux OS, which will cost you a whopping nothing.

Gain full Mastery over your Computer with a Linux OS for Mac

Despite the fact that Linux and Mac are both based on Unix, they are worlds apart when it comes to modification. Sure you can move some things around or make some minor modifications with Mac OS, but anything deeper than that is pretty much locked down.

Not so with a Linux OS for Mac. Depending on your experience and dedication, you can make Linux do practically anything you want it to, and with its wide fan base, you can almost always find forums or guides to help you. The diversity and enthusiasm of the Linux community is a great benefit over what is offered by Apple, who seems to leave most of its documentation up to third parties like the Missing Manual folks.

Mac is Intuitive?

Apple fans can be quick to boast about how easy it is to use the Mac OS. It might be easy for those familiar with its quirks (no right-click, programs not closing when you close their window, etc.), but for someone completely new to the OS (my wife for instance), these idiosyncrasies can be a turnoff.

Linux, on the other hand, has many flavors (e.g. Lycoris or Ubuntu Desktop) that feel more like Windows than Mac, and are easier for a Windows user to adapt to. So, when my wife, for example, wants to use my computer, it’s more natural for her to fire up and navigate a Linux OS for Mac than it is to use the native Mac OS. If you plan on letting others use your computer, a Linux environment could very well be a better choice.

The Bottom Line

Apple makes great software, but it’s not the only option. You can do a lot of things with Mac OS X, and Apple is cooking up more features all the time; however, a Linux OS for Mac could very well help you take full advantage of your Apple hardware, for free, and allow non-Apple-savvy friends to get some benefit from your machine as well. Disagree? Leave a comment and tell me why it’s wrong to use a Linux OS for Mac.

  • « Previous Page
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • Next Page »

Get the Best Games

Looking for something new to play? Check out BestGamesList.com for the best games 2017 has to offer.

Connect with S&T

Get Free Updates

Enter your email address for free updates on video games and technology from SLee And Topher.

Support SLee & Topher and earn rewards using Ebates:
Ebates Coupons and Cash Back

Must See Stories

Netflix Download and Go

Downloading TV Shows and Movies on Netflix

Retrieve iPhone IMEI

Android Wear: Google’s Wearables Platform Is Here

Domo for NHK

9 Famous Tech Mascots and Their Colorful Backstories

Official ‘Batman: Arkham Knight’ Trailer Reveals Driveable Batmobile

Site Builder Banner for iPage – 250x250

Copyright © 2025 ·Magazine Pro Theme · Genesis Framework by StudioPress · WordPress · Log in