Thoughtful, detailed coverage of the Mac, iPhone, and iPad, plus the best-selling Take Control ebooks.

 

 

Pick an apple! 
 
Springy Dock Tricks

If you drag a file and hover over Dock icons, various useful things happen which are similar to Finder springing. If it's a window, the window un-minimizes from the Dock. If it's a stack, the corresponding folder in the Finder opens. If it's the Finder, it brings the Finder to the foreground and opens a window if one doesn't exist already. But the coolest (and most hidden) springing trick is if you hover over an application and press the Space bar, the application comes to the foreground. This is great for things like grabbing a file from somewhere to drop into a Mail composition window that's otherwise hidden. Grab the file you want, hover over the Mail icon, press the Space bar, and Mail comes to the front for you to drop the file into the compose window. Be sure that Spring-Loaded Folders and Windows is enabled in the Finder Preferences window.

Visit plucky tree

Submitted by
cricket

 

 

Related Articles

 

 

Encryption Cracked by Listening to a Computer’s CPU

Send Article to a Friend

If this were a movie, we’d be laughing at the improbability of the premise — that encryption can be cracked by listening to the high-pitched sounds produced by a computer’s CPU as it decrypts data. But it’s real, and although it can be done at a distance of 4 meters with a parabolic microphone, the researchers (Daniel Genkin, Eran Tromer, and Adi Shamir, who is the S of the RSA cryptosystem) also showed that it could be done with a smartphone sitting next to a laptop. Upping the ante, they suggest that a microphone hidden inside a colocated server could eavesdrop on numerous nearby servers. In short, if security is paramount, both heavy-duty encryption and physical protection are necessary.favicon follow link

 

Comments about Encryption Cracked by Listening to a Computer’s CPU
(Comments are closed.)

James Deaton  2013-12-20 12:36
It does not matter how hard people try to hide under the bed, someone will poke under it with a boom handle some time or another. there is no way to save a computer from someone else, if they really want to see what you are doing... They will...
artMonster  2013-12-21 17:06
As far as electromagnetism is concerned, we all live in glass houses. Just keep building better blinds.