Thoughtful, detailed coverage of the Mac, iPhone, and iPad, plus the best-selling Take Control ebooks.

 

 

Pick an apple! 
 
Springy Dock Tricks

If you drag a file and hover over Dock icons, various useful things happen which are similar to Finder springing. If it's a window, the window un-minimizes from the Dock. If it's a stack, the corresponding folder in the Finder opens. If it's the Finder, it brings the Finder to the foreground and opens a window if one doesn't exist already. But the coolest (and most hidden) springing trick is if you hover over an application and press the Space bar, the application comes to the foreground. This is great for things like grabbing a file from somewhere to drop into a Mail composition window that's otherwise hidden. Grab the file you want, hover over the Mail icon, press the Space bar, and Mail comes to the front for you to drop the file into the compose window. Be sure that Spring-Loaded Folders and Windows is enabled in the Finder Preferences window.

Visit plucky tree

Submitted by
cricket

 
 

Google Offers Secure Search Beta

Send Article to a Friend

Google has launched a beta of secure Web searching at https://www.google.com/ - to search securely, you must start from that URL. The security is provided through normal SSL/TLS connections, which Google labels as "SSL" in the graphic, probably because the older (and outdated) term SSL is more familiar to users and certainly easier to say.

This is part of Google's effort to add encryption to more of the company's basic services, providing protection against snoops on local networks. SSL/TLS encryption ensures that communication between a Web browser and a Web server can't be decoded by anyone listening in on the communication stream. This addition of SSL/TLS will enable those in repressive dictatorships to search Google without worrying about government surveillance - assuming the government allows access to Google at all.

Not all of Google's search-related services, including Image Search and Maps, support SSL/TLS at this time, and of course, if you use the search bar in your Web browser, you won't be using the encrypted search option. Finally it's worth noting that securing search doesn't prevent Google from making use of your data; such uses are governed by Google's own privacy policy.

I recommend that anyone using an open Wi-Fi network or untrusted Ethernet network (such as at a hotel) rely on some form of encryption to protect communications. A virtual private network (VPN) connection is best, but second best is enabling encryption on all connections over which private data or cleartext passwords could potentially be sent, such as email, file-sharing links (like WebDAV), and FTP.

Earlier this year, Google flipped a switch so that Gmail Web sessions are conducted securely by default using SSL/TLS; see"Google's Gmail Defaults to Encrypted Sessions" (13 January 2010).

For more details on how SSL/TLS works, read Chris Pepper's "Securing Communications with SSL/TLS: A High-Level Overview" (25 June 2007). And for a somewhat out-of-date article about VPNs that's still worthwhile reading for its discussion of basic concepts, see Kevin van Haaren's "For Your Eyes Only: Virtual Private Networks," (15 August 2005).

 

READERS LIKE YOU! Support TidBITS by becoming a member today!
Check out the perks at <http://tidbits.com/member_benefits.html>
Special thanks to bill allen, Noel Macwhirter, Terry Kopecky, and
Stephan Stephan for their generous support!