Thoughtful, detailed coverage of the Mac, iPhone, and iPad, plus the best-selling Take Control ebooks.

 

 

Pick an apple! 
 
Avoid Naming Pear Note Files

If you create a lot of documents, coming up with a name for them can sometimes be a hassle. This is especially true now that search is becoming a more prevalent way to find documents. Pear Note provides a way to have the application automatically generate a filename so you can avoid this hassle. To use this:

  1. Open Saving under Pear Note's preferences.
  2. Select a default save location.
  3. Select a default save name template (Pear Note's help documents all the fields that can be automatically filled in).
  4. Check the box stating that Command-S saves without prompting.
  5. If you decide you want to name a particular note later, just use Save As... instead.

Visit Useful Fruit Software

 
 

ExtraBITS for 16 August 2010

Send Article to a Friend

Just two quick bits for you this week - a hearty congratulations to the inimitable Nitrozac and Snaggy for the 10th anniversary of their Joy of Tech comic and a link to an academic paper showing that smartphone passwords could be hacked by virtue of screen smudges.

Joy of Tech Comic Celebrates 10th Anniversary -- Congratulations to Nitrozac and Snaggy for 10 years of their technology-focused Joy of Tech comic, which has long been a regular stop for all of us here at TidBITS. If you're not reading it, you're missing out on one of the top sources of technology humor, often with a wry emphasis on the world of Apple.

Read/post comments

Smartphones Susceptible to Smudge Hacking (PDF) -- Don't get too paranoid about this, but security researchers at the University of Pennsylvania have shown than Android graphical passwords can be recovered by photographing the screen of a smartphone and analyzing the smudge patterns. There isn't much likelihood of this attack being used widely, because its utility requires either gaining control of the smartphone or the same password being used elsewhere, and the screen can easily be cleaned. But it's still interesting just where security vulnerabilities will be found.

Read/post comments

 

Make friends and influence people by sponsoring TidBITS!
Put your company and products in front of tens of thousands of
savvy, committed Apple users who actually buy stuff.
More information: <http://tidbits.com/advertising.html>