Thoughtful, detailed coverage of the Mac, iPhone, and iPad, plus the best-selling Take Control ebooks.

 

 

Pick an apple! 
 
Find Text Leading from Acrobat PDF

Ever have to recreate a document from an Acrobat PDF? You can find out most everything about the text by using the Object Inspector, except the leading. Well, here's a cheesy way to figure it out. Open the PDF in Illustrator (you just need one page). Release any and all clipping masks. Draw a guide at the baseline of the first line of text, and one on the line below. Now, Option-drag the first line to make a copy, and position it exactly next to the original first line at baseline. Then put a return anywhere in the copied line. Now adjust leading of the copied lines, so that the second line of copy rests on the baseline of the second line of the original. Now you know your leading.

Or you could buy expensive software to find the leading. Your choice.

Visit Mac Production Artist Tips and Scripts

Submitted by
Greg Ledger

 
 

Critical Microsoft Security Patches Released

Send Article to a Friend

Microsoft has released security patches to address two security vulnerabilities affecting Internet Explorer, Outlook Express, and Office applications for both the "Classic" Mac OS (Mac OS 8 and Mac OS 9) and Mac OS X. Microsoft is urging all users of these programs to download and apply the patches at once.

<http://www.microsoft.com/security/security_ bulletins/ms02019_mac.asp>

Vulnerable software includes:

  • Internet Explorer 5.1 for Mac OS X
  • Internet Explorer 5.1 for Mac OS 8 or 9
  • Outlook Express 5.0 through 5.0.3
  • Entourage X for Mac OS X
  • Entourage 2001
  • PowerPoint X for Mac OS X
  • PowerPoint 2001
  • PowerPoint 98
  • Excel X for Mac OS X
  • Excel 2001

The first security vulnerability could make it possible for malicious HTML code in a Web page, HTML email message, or Office document to exploit a buffer overflow; theoretically, an attacker could exploit this buffer overflow to perform such tasks on your computer as deleting or changing files, or installing and running software without your permission. (Under Mac OS X, the attacker would have the same privileges as the current user, which could limit the vulnerability.) In the case of Office documents (Word files, Excel spreadsheets, or PowerPoint presentations), the user would have to open the malicious document to be exposed; both Microsoft and common sense both say you should never open files from unknown sources.

The second vulnerability affects only Internet Explorer 5.1 under Mac OS 8 or Mac OS 9. It could make it possible for an attacker to run an existing AppleScript script on your computer, but only if the script's name and complete path were known. (The attacker cannot install a script; it must already be available.) The most common "well-known" scripts are those in the Speakable Items folder; they perform tasks like quitting applications, restarting the computer, emptying the Trash, and more.

The patches for Microsoft Office 2001 (263 K), Office X (1.8 MB), and Outlook Express (new version 5.0.4; 8.6 MB), and patches for Mac OS 8 and OS 9 users of Internet Explorer (new version 5.1.4; 5.4 MB), are available for download from Microsoft's Macintosh download site. Mac OS X users should apply the patch to Internet Explorer for Mac OS X via the Software Update feature of Mac OS X, available via System Preferences. Mac OS X users must still manually download and apply the patches for Office or other applications.

<http://www.microsoft.com/mac/DOWNLOAD/ OFFICE2001/URLSecurity.asp>
<http://www.microsoft.com/mac/DOWNLOAD/OFFICEX/ CombUpd1003.asp>
<http://www.microsoft.com/mac/DOWNLOAD/OE/ oe504.asp>
<http://www.microsoft.com/mac/DOWNLOAD/IE/ ie51.asp>
<http://www.microsoft.com/mac/download/>

Microsoft says versions of Internet Explorer prior to 5.1, of Outlook Express prior to 5.0.1, and of Office prior to Office 98 are no longer supported, have not been tested, and may or may not be subject to these vulnerabilities.

The current security patches, when applied, also patch all previously noted vulnerabilities in these versions of the Microsoft applications.

Microsoft is offering free user support by phone to U.S. and Canadian callers at 866/727-2338. International users should contact their local subsidiary for information about obtaining free support for downloading and installing these patches.

<http://www.microsoft.com/worldwide/>

 

Make friends and influence people by sponsoring TidBITS!
Put your company and products in front of tens of thousands of
savvy, committed Apple users who actually buy stuff.
More information: <http://tidbits.com/advertising.html>