Thoughtful, detailed coverage of the Mac, iPhone, and iPad, plus the best-selling Take Control ebooks.

 

 

Pick an apple! 
 
Extract Directly from Time Machine

Normally you use Time Machine to restore lost data in a file like this: within the Time Machine interface, you go back to the time the file was not yet messed up, and you restore it to replace the file you have now.

You can also elect to keep both, but the restored file takes the name and place of the current one. So, if you have made changes since the backup took place that you would like to keep, they are lost, or you have to mess around a bit to merge changes, rename files, and trash the unwanted one.

As an alternative, you can browse the Time Machine backup volume directly in the Finder like any normal disk, navigate through the chronological backup hierarchy, and find the file which contains the lost content.

Once you've found it, you can open it and the current version of the file side-by-side, and copy information from Time Machine's version of the file into the current one, without losing any content you put in it since the backup was made.

Submitted by
Eolake Stobblehouse

 

 

Related Articles

 

 

Protect Yourself From the Safari RSS Vulnerability

Send Article to a Friend

Programmer Brian Mastenbrook revealed on 11-Jan-09 that he has discovered a security vulnerability that could allow a malicious Web site you visit using Safari to read any file on your system. The flaw affects the latest versions of Safari when used in Mac OS X 10.5 Leopard or Windows, though not in earlier versions of Mac OS X. Mastenbrook wrote that he has reported the details to Apple.

The vulnerability apparently could reveal the contents of any file, which includes email messages, passwords stored in browser cookies, or other documents. We have strong indications that the problem is real and you should immediately protect yourself in case malicious attackers figure out the vulnerability's full details before Apple issues a patch.

The vulnerability lies in the Safari RSS reader, and according to Mastenbrook, you may be affected even if you don't use the reader, as long as Safari is set to be your default RSS reader, which it is unless you've changed the setting. This likely indicates that the problem relates to how Safari handles RSS subscription links or feeds, since browsing to those triggers Safari's RSS reader.

The good news is that it's relatively easy to protect yourself. If you are on Windows, just stop using Safari until a fix is released. If you are using Mac OS X 10.5 Leopard, follow the updated instructions on Mastenbrook's Web site, linked above. Simply changing the default RSS reader application in Safari does not provide full protection, unfortunately.

It's always a relief when there is a reasonable workaround to a potentially serious security vulnerability, and we won't be surprised if Apple patches this vulnerability fairly quickly.

 

CrashPlan is easy, secure backup that works everywhere. Back up
to your own drives, friends, and online with unlimited storage.
With 30 days free, backing up is one resolution you can keep.
Your life is digital; back it up! <http://tid.bl.it/code42-tb>