Thoughtful, detailed coverage of the Mac, iPhone, and iPad, plus the best-selling Take Control ebooks.

 

 

Pick an apple! 
 
Untrash the Trash

Feeling trasher's remorse? On Snow Leopard, you can open the Trash (click the Trash icon in the Dock) and "untrash" individual items there. Select one or more trashed items (files and folders) and choose File > Put Back. This returns the items to where they were when you originally put them in the trash. The keyboard shortcut is Command-Delete - the same as the shortcut for trashing an item in the first place, since in deleting something from the trash you are untrashing it.

Submitted by
Matt Neuburg

 
 

Google Offers Secure Search Beta

Send Article to a Friend

Google has launched a beta of secure Web searching at https://www.google.com/ - to search securely, you must start from that URL. The security is provided through normal SSL/TLS connections, which Google labels as "SSL" in the graphic, probably because the older (and outdated) term SSL is more familiar to users and certainly easier to say.

This is part of Google's effort to add encryption to more of the company's basic services, providing protection against snoops on local networks. SSL/TLS encryption ensures that communication between a Web browser and a Web server can't be decoded by anyone listening in on the communication stream. This addition of SSL/TLS will enable those in repressive dictatorships to search Google without worrying about government surveillance - assuming the government allows access to Google at all.

Not all of Google's search-related services, including Image Search and Maps, support SSL/TLS at this time, and of course, if you use the search bar in your Web browser, you won't be using the encrypted search option. Finally it's worth noting that securing search doesn't prevent Google from making use of your data; such uses are governed by Google's own privacy policy.

I recommend that anyone using an open Wi-Fi network or untrusted Ethernet network (such as at a hotel) rely on some form of encryption to protect communications. A virtual private network (VPN) connection is best, but second best is enabling encryption on all connections over which private data or cleartext passwords could potentially be sent, such as email, file-sharing links (like WebDAV), and FTP.

Earlier this year, Google flipped a switch so that Gmail Web sessions are conducted securely by default using SSL/TLS; see"Google's Gmail Defaults to Encrypted Sessions" (13 January 2010).

For more details on how SSL/TLS works, read Chris Pepper's "Securing Communications with SSL/TLS: A High-Level Overview" (25 June 2007). And for a somewhat out-of-date article about VPNs that's still worthwhile reading for its discussion of basic concepts, see Kevin van Haaren's "For Your Eyes Only: Virtual Private Networks," (15 August 2005).

 

Automatic turns almost any car into a connected car. By pairing
Automatic’s connected car adapter with iPhone apps on
Automatic’s platform, drivers are able to drive safer and smarter.
TidBITS readers get 20% off all orders at <http://automatic.com/tb>