Thoughtful, detailed coverage of the Mac, iPhone, and iPad, plus the best-selling Take Control ebooks.

 

 

Pick an apple! 
 
Is it a Unicode Font?

To determine if your font is Unicode-compliant, with all its characters coded and mapped correctly, choose the Font in any program (or in Font Book, set the preview area to Custom (Preview > Custom), and type Option-Shift-2.

If you get a euro character (a sort of uppercase C with two horizontal lines through its midsection), it's 99.9 percent certain the font is Unicode-compliant. If you get a graphic character that's gray rounded-rectangle frame with a euro character inside it, the font is definitely not Unicode-compliant. (The fact that the image has a euro sign in it is only coincidental: it's the image used for any missing currency sign.)

This assumes that you're using U.S. input keyboard, which is a little ironic when the euro symbol is the test. With the British keyboard, for instance, Option-2 produces the euro symbol if it's part of the font.

Visit Take Control of Fonts in Leopard

Submitted by
Sharon Zardetto

 
 

Trojan Horse Reward

Send Article to a Friend

REWARD OFFERED FOR INFORMATION LEADING TO ARREST AND CONVICTION OF TROJAN HORSE AUTHOR

The MAUG Staff on CompuServe discovered an upload called CHINAT.CPT which, when we routinely examined the file, revealed itself to be a Trojan Horse program. The program, "Chinatalk," purports to be a female voice for Macintalk. But when run it will overwrite the directory of any hard disk it finds online, which is the same as choosing Erase Disk... from the Finder.

The file was never made public here, on ZiffNet/Mac or on any CompuServe Forum.

All sysops of private BBS services should be on the lookout for this file.

If anyone has information on the perpetrator of this Trojan Horse program please contact me - Neil Shapiro - via either email or phone at 516/735-6924.

On behalf of MAUG, I am personally posting a $500.00 reward for information which leads to the arrest and conviction of this criminal. (Should more than one person supply identical information the reward will be to the first giving the information; or if two or more people give information which is both non-identical and necessary to catching the criminal the reward will be equally split between the parties.) Let's catch this pond scum and let's do it quickly!

Again: the file was NEVER made public here, on ZiffNet/Mac, or on any other CompuServe Forum. Thanks, -- Neil Shapiro (Chief Sysop, MAUG)

Information from:
Neil Shapiro -- 76703.401@compuserve.com

 

READERS LIKE YOU! Support TidBITS by becoming a member today!
Check out the perks at <http://tidbits.com/member_benefits.html>
Special thanks to Graham Kirkpatrick, Sharon Gibbs, John Quinsey, and
Robert Sims for their generous support!