New to iPhone, made a mistake typing, deleting, cutting, or pasting and wondering how to undo it? While you might have already figured this out through unbridled frustration. If you’ve been editing some text and you either typed the wrong thing, deleted more than you intended to, or cut, copy, or pasted yourself into error-land, here’s what you do:
Hold you iPhone firmly in one hand
Shake it (Really)
Tap the Undo button to confim
Apple has built “shake to undo” into the iPhone since iOS 3 and it works really well.
Verizon will offer a CDMA EVDO version of the iPhone 4 starting February 10.
Existing Verizon Wireless customers will be able to start pre-ordering the device on February 3. The 16GB version with a two-year contract will cost $199.99, while the 32GB version will cost $299.99. The device will be available at more than 2,000 Verizon stores, via Verizon’s Web site, at Apple Retail stores, and via Apple’s Web site.
The abundance of free/cheap and open Wi-Fi networks in restaurants, airports, offices and hotels is a great perk to the traveling user; it makes connectivity and remote access much easier than it used to be. But you need to be informed and understand the risks.
Unfortunately, most of those “Open” networks don’t employ WEP or WPA passwords to secure the connection between device and hotspot, every byte and packet that’s transmitted back and forth is visible to all the computers on the wireless LAN, all the time. While certain sites and services use full-time browser encryption (the ones that have URLs beginning with https:// and that show a lock in the browser status bar), many only encrypt the login session to hide your username and password from prying eyes. This, as it turns out, is the digital equivalent of locking the door but leaving the windows wide open.
Firesheep is a Firefox extension which makes it trivially easy to impersonate someone to the websites they log in to while on the same open Wi-Fi network. It kicks in when you login to a website (usually in a secure fashion, via HTTPS) and then the site redirects you to a non-secured page after login. Most sites that operate this way will save your login information in a browser cookie, which can be ‘sniffed’ by someone on the same network segment; that’s what Firesheep does automatically. With the cookie in hand, it’s simple to present it to the remote site and proceed to do bad things with the logged-in account. Bad things could range from sending fake Twitter or Facebook messages all the way up to, potentially, buying things on ecommerce sites.
USE SSL/HTTPS only if the website supports it — is quite simple: after you connect, the site should keep your session secure using SSL or https. Some sites, including most banking sites, already do this. However, encryption requires more overhead and more server muscle, so many sites (Facebook, Twitter, etc.) only use it for the actual login. Gmail has an option to require https and has made it the default setting, but you should make sure that it’s enabled if you use Gmail (Google Apps has a similar feature). This also doesn’t necessarily help if you’re using an embedded browser in an iPhone or iPad app, where the URL is hard-coded.
Protecting yourself from Firesheep if you use Firefox or Chrome is possible with extensions like the EFF’s HTTPS Everywhere, Secure Sites or Force-TLS. These work by forcing a redirect to the secure version of a site, if it exists. The obvious problems with these solutions are: a) you have to install one for each browser (and we have not yet found one for Safari), and b) it only works if a secure version of the site exists.
A) Don’t use open networks.
B) Use a SOCKS proxy and SSH tunnel.
C) Use a VPN.
adapted via tuaw.com
Apple announced iOS 4.1, addressing many bugs (like iPhone 3G performance) as well as bringing new features like HDR photography, HD video upload and TV show rentals. Additionally, Apple previewed iOS 4.2, bringing this and more to the iPad.
iOS 4.1 – focuses on photos, videos, and games.
iOS 4.2 – brings the features of iOS 4 to the iPad. Multitasking, app folders, and other features will be available in November.
You can easily find out where people live, what kind of things they have in their house and also when they are going to be away.
Security experts and privacy advocates have recently begun warning about the potential dangers of geotags, which are embedded in photos and videos taken with GPS-equipped smartphones and digital cameras. Because the location data is not visible to the casual viewer, the concern is that many people may not realize it is there; and they could be compromising their privacy, if not their safety, when they post geotagged media online.
Very few people know about geotag capabilities and the only way you can turn off the function on your smartphone is through an invisible menu that no one really knows about.
Indeed, disabling the geotag function generally involves going through several layers of menus until you find the “location” setting, then selecting “off” or “don’t allow.” But doing this can sometimes turn off all GPS capabilities, including mapping, so it can get complicated.
Because of the way photographs are formatted by some sites like Facebook, geotag information is not always retained when an image is uploaded, which provides some protection, albeit incidental. Other sites like Flickr have recently taken steps to block access to geotag data on images taken with smartphones unless a user explicitly allows it.
But experts say the problem goes far beyond social networking and photo sharing Web sites, regardless of whether they offer user privacy settings.
You need to educate yourself and your friends but in the end, you really have no control, protecting your privacy is not just a matter of being aware and personally responsible. A friend may take a geotagged photo at your house and post it.
ICanStalkU.com provides step-by-step instructions for disabling the photo geotagging function on iPhone, BlackBerry, Android and Palm devices.
adapted via nytimes.com
The loss of a smartphone wouldn’t be so bad if it ended with merely a bit of embarrassment. Since many people now use smartphones for online banking, travel reservations, and storing sensitive business documents, however, a great deal of very private data ends up on the device.
Much of this data is safe behind password-protected applications, but a large portion of it dangles out in the open in e-mail messages, text documents, images, and other files.
What are smartphone users doing to protect the precious data in their pricey handsets?
Apparently not much, according to some industry experts. And that’s surprising, given the number of apps and phone features available for safeguarding data. According to experts, you’re 15 times more likely to lose your cell phone than your laptop computer.
Another danger: A lost smartphone may soon be the high-tech equivalent of a lost wallet.
New wireless-transaction services will soon allow a smartphone to replace cash or a credit card at a store’s point of purchase. Though the convenience of cell-phone-enabled purchases may be attractive, the danger of losing a cash-enabled phone to a thief is obvious.
Lost or Stolen?
Phones are often lost by accident, but waves of cell phone thefts are nothing new in major cities. Though crime stats in New York have declined in recent years, cell phones and iPods lead the way among the types of items stolen. Transit authorities now make regular announcements–in addition to posting signs on platforms and in trains–warning riders not to flash electronic gadgets unnecessarily.
Are You Protected?
Locking a smartphone’s screen with a password offers a good first layer of protection–a simple process that, unfortunately, phone owners often fail to undergo.
The next layer could come in the form of an add-on phone-tracking application such as Microsoft’s free My Phone for Windows Mobile or Apple’s Find My iPhone app, which works on iPhones and iPads but requires a $99 annual subscription to Apple’s MobileMe data-syncing and backup service. The $15 Theft Aware for Android is one of several apps that can help you locate your missing Droid.
What else can you do to protect your cell phone’s data?
adapted from pcworld.com
Steve Jobs returns and receives a standing ovation.
iPhone OS 3.1 Update – Free.