Thoughtful, detailed coverage of the Mac, iPhone, and iPad, plus the best-selling Take Control ebooks.

 

 

Pick an apple! 
 
Add Hyperlinks to TextExpander Snippets

You can include a clickable link in a TextExpander snippet. Here's how:

  1. Create a new snippet.
  2. From the Content menu (just above the snippet body), choose Content: Formatted Text, Picture.
  3. Put a full URL in the snippet body, such as http://www.smilesoftware.com/
  4. Control-click the link text and choose Make Link from the pop-up menu.

After you've made the link, you can replace the visible URL with other text. Just put your cursor in the active link text and make changes as you would with any other text.

Visit Smile

 
 

Apple Updates Windows Safari Beta with Security Fixes

Send Article to a Friend

Within three days of Apple's release of the Safari Web browser for Windows XP and Vista in beta testing versions, several significant security flaws were discovered, some of which were reported to Apple. The company responded quickly, issuing a bug fix release last week for three potential problems that involved specially crafted content at malicious Web sites that must be visited to trigger the vulnerabilities.

The bugs were discovered - at least in the descriptions provided by the coders who found them - through the use of fuzzing, a technique that throws piles of crud at targeted areas of a system or application to see what breaks. Fuzzing is a brute force method, but it has to be paired with more refined technical knowledge to understand how to take advantage of a flaw.

A non-programmer could potentially use fuzzing to figure out how to crash a piece of software or even an operating system, but they used to have a harder time making use of that crash to tailor an attack that would allow them some sort of access. Programs like Metasploit provide a bridge between fuzzing and exploitation, however, and as they become increasingly powerful, "script kiddies" - relatively unsophisticated users who use prefabricated attacks - may have more disruptive power.

It's disturbing that Apple isn't stress-testing its public beta software with the same kind of readily available tools for fuzzing used by both researchers and the nefarious. Many of the Month of Apple Bugs flaws (see "MoAB Is My Washpot," 2007-02-19), as well as many recent AirPort and AirPort Extreme problems, were discovered through fuzzing.

Apple's security update notice, which I cannot find archived online, notes, "This beta software is for trial purposes and intended to gather feedback prior to a full release." That is, "Bite us: This is beta software." The flip side, of course, is when Steve Jobs says, hey, go download the beta, it's hard to argue that serious security flaws aren't just as serious as they are in released software.

Apple also said, "As with all our products, we encourage security researchers to report issues to product-security@apple.com." No researchers were credited for the three fixed bugs.

 

Updated! PDFpen for iPad 1.7: Designed for iOS 7, faster, and
better-looking. Edit your PDFs anywhere. Sign contracts, make
changes, fill forms, and more. All while you’re on the move.
Syncs via iCloud and Dropbox. <http://smle.us/tbpdfpen-ipad>