Categories
How-to IT News, Tech Information and Analysis Learning

How to Setup & Configure Handoff on OS X Yosemite and iOS8

One of the highlights of the Apple WWDC 2014 has been the announcement of the Handoff part of the Continuity features of OS X Yosemite. With OS X Yosemite and iOS 8, devices recognize when they are near each other, enabling new features that let them work seamlessly together. You can move back and forth between devices without having to stop using any application.

One can even make and receive iPhone calls right on their Mac. When the iPhone rings, you will see a notification on the Mac showing the caller’s name, number, and profile picture. Click the notification to answer, and your Mac becomes a speakerphone. You can also decline the call or respond with a quick iMessage. Making a phone call from Mac is just as easy.

With OS X Yosemite and an iPhone running iOS 8, you can send and receive SMS and MMS text messages right from your Mac; regardless of the phone they have, the message would toggle between an iMessage and normal SMS/MMS.

Verify if your Mac supports Handoff:

Handoff work only on newer Macs that support Bluetooth 4.0 and the Bluetooth LE (low energy) technology. Not all Macs support this. To check if your Mac supports Handoff, check for the Bluetooth’s LMP version. Go to the Apple Menu, choose About this Mac, then click More Info, and then click on the System Report Head to the Apple Menu, then go About This Mac > More Info > System Report > Bluetooth. Look at the LMP Version. The version needs to be 0x6 for Handoff to work.

Alternatively, you can also run this command on terminal
system_profiler SPBluetoothDataType | grep LMP

How to Activate Handoff:

Step 1: Go to System preferences > General and then click on the allow handoff box at the bottom.

Step 2: Now, on your iOS 8 powered device, go to Settings > General and enable hand off.

Step 3:  On your Mac and open FaceTime > preferences and check the allow iPhone calls box.

Once you have set all things up, you are all set to use HandOff.

Categories
IT News, Tech Information and Analysis Learning

MHL Technology – Introduction, Features and Products.

MHL was developed by the MHL Consortium, a Consortium made up of leading companies in the mobile and CE space that include Nokia, Samsung, Silicon Image, Sony, and Toshiba. MHL is a technology that allows you to easily connect your MHL mobile devices to the big screen. It also works with existing HDMI TVs through the use of an MHL-to-HDMI adapter. Once connected, you can view your videos, play music and games, run a slideshow of your pictures on the big screen for your family and friends, all while the TV charges back the device. The global MHL ecosystem includes adapters, automotive accessories, A/V receivers, Blu-ray Disc players, cables, DTVs, monitors, projectors, smartphones, streaming media sticks, tablets and more.

MHL 3.0 features:

MHL announced its 3.0 specification to address the latest consumer requirements for connecting a mobile device to displays, marking major advancements in the areas of audio and video transmission over an MHL link. The first products to include the latest MHL specification were the Sony Xperia Tablet Z2,the Sony Xperia Z2 smartphone, the Samsung S9, U8500 and U7500 TV series, and Sony X950B and X900B TV series.

Features of the MHL 3.0 specification include support of 4K (Ultra HD), simultaneous high-speed data channel, improved Remote Control Protocol (RCP) with support for peripherals such as a touch screen, keyboard and mouse, enhanced 7.1 surround sound with Dolby TrueHD and DTS-HD, and support for simultaneous multiple displays. Further, it also supports higher power charging up to 10W and the latest HDCP 2.2 content protection.

MHL Specification Feature Comparison

Advantages of MHL

  • MHL enables you to connect your phone to the big screen for personal entertainment to watch videos and view pictures.
  • Connect a Bluetooth game controller to your smartphone and play games with no lag on your TV similar to a game console experience.
  • If you do not own a Smart TV, you can connect MHL streaming sticks such as the Roku Streaming Stick and Sony Bravia Smart Stick to the MHL slot of your TV and transform it into a smart one.
  • Simultaneously charges your phone while you’re connected to the TV, so you’ll never have to worry about a dead battery
  • MHL can also help you transform your phone into a portable computer by connecting it to a keyboard, mouse, monitor (or multiple monitors), and storage device to work anytime, anywhere. Another potential productivity use case is the mobile device connected to a smartbook “shell” where all of the processing power comes from the phone.

MHL Products:

There is an installed base of more than 650 million products globally from leading mobile and CE manufacturers. These products include adapters, automotive accessories, A / V receivers, Blu-ray Disc™ players, cables, DTVs, monitors, projectors, smartphones, streaming media sticks, tablets, and more. A full list of MHL-enabled devices can be found here: http://www.mhltech.org/productlist/

MHL 3.0 products include:

  • ZTE nubia Z7 smartphone
  • Samsung Galaxy Note 4 smartphone
  • Sony Xperia Z3 smartphone and tablet
  • Sony Xperia Z2 and ZL smartphones
  • Sony Xperia Z2 tablet
  • Sony X9500B, X9200B, X8500B UHD TV Series
  • Samsung S9, U8500 and U7500 TV Series
  • Videocon VKR40QX-ZSA, VKR50QX-ZSA, VKR55QX-ZSA, VKR65QX-ZSA, VKR85QX-ZSA

Specific to India, there are phones and tablets from HTC, Huawei, Samsung, Sony and ZTE. There are also a variety of TVs from LG, Samsung, Sony and Toshiba.

Categories
Featured How-to IT News, Tech Information and Analysis Learning

How to keep your Passwords and Online Accounts Safe?

Internet has provided us with some amazing ways to do our day-to-day tasks better; sharing content and even getting in touch with friends have never been so awesome. As easy as it sounds, it is equally vulnerable to attacks. Most hackers either take control of your account for malicious activity or are just mere stalkers. I did hear about a couple of stalking cases from my friends recently and that’s when I thought of writing this piece. I even had a discussion with my friends online and they shared few commonly used methods in this regard.

Here are some of the best practices. The first tip is a very obvious one; using a strong password.

1. How to Keep Passwords Safe:

  • A strong password is generally referred to a key which has over 14 characters with at least 1 special character and numbers. There are online tools which can help you with suggesting some passwords. Random and Secure Passwords to name a few.

  • Do not use consecutive letters or numbers. For eg: abcd, 9876 etc.
  • Do not reuse old passwords; change your password regularly, at-least once in three months.
  • Do not use your family members name, the place you work, Anniversary and Birthday dates as passwords which is commonly known to others.
  • Do substitute numbers, symbols, and misspellings for letters or words in an easy-to-remember phrase. Passphrase as some would refer. Again, partial substitution is a good idea. For example, One Step Closer can be One$tepCl0sEr.
  • Do not use long words, quotations or phrases in your password; anyone around your desk or the key logging tools can always track the possibilities.
  • Do not use the same password for all your email accounts.
  • Do not write down your passwords on a paper near your desk; or even as a saved note on your Phone.
  • Do not sharing password information on Emails and Instant Messengers etc.

2. Social Accounts:

  • If you use your Gmail address to sign-in to your Facebook Account, use unique passwords for the same. Your Gmail account and Facebook’s password doesn’t need to be the same.
  • Similar to emails, do not have the same password for all your social accounts.
  • Having a base password mixed with a prefix or suffix created using the name of each website can be a good idea too. So, for example, Facebook, the password is H!Th3r3Face. For Google, H!Th3r3Goog.
  • If you have synced your email / Facebook accounts with your Phone, try enabling a passcode/pattern/finger print for your device.
  • It is very easy to impersonate your profile these days. A hacker, generally takes the relevant details from your profile and your display pictures and create a new profile with your exact name. These fake profiles further send out friend requests to all your contacts claiming that, your old account was hacked and this would be your new profile. In such a scenario, it would be great idea to talk to your friend over phone, before you confirm the friend request.
  • If you abandon an old email address associated with any of your social accounts like Facebook, Apple ID, Dropbox etc. Be sure to update them with your current email address.

3. Two-Factor Authentications and OTPs

Two-Step Verification adds an extra layer of security to your online Account, drastically reducing the chances of having the personal information in your account getting stolen. To break into an account with 2-Step Verification, a hacker would not only have to know your username and password, they’d also have to get a hold of your phone.This can be a turn off to many people considering that, some of the providers send you a code via SMS, and you will need to wait for the SMS code before you log-in.

Google also introduced an USB Security Key; one does not need to look or wait for codes on the phone and then re-type it; rather he/she can simply insert the Security Key into computer’s USB port when asked.

However, Google’s 2 Factor authentication doesn’t need a SMS too; you can use their mobile app for the secondary token. It is quite similar to those RSA token generatorsDo find the detailed steps for Google Accounts.

Apple has introduced this option for the iCloud users as well. In order to set up the two-factor authentication on Apple’s cloud storage service, users must login to the Apple ID account, click on “Password and Security” and find “Two-step verification.” Once activated, a unique four-digit verification code is sent to the registered mobile number via SMS or Find My iPhone. The unique code will be asked every time there is suspicious account activity, like login from an unfamiliar device. This way, unauthorized access to the accounts can be blocked.

Facebook calls it code generator; Once you login, you can then get to the security settings and enable this feature. As a review, you can also check on the logic notifications, and trusted browsers to verify if those are the machines/connections you used in the past.

Read these official notes from LinkedIn and Twitter for detailed steps. Enabling an OTP before making a fund-transfer or payment is considered safe in online banking; Most of the banks do this by default now.

4. Email Attacks:

  • Phishing scams – Do not click on links in suspicious email messages, and never provide personal information on any websites. Think before you click or download anything. Some deals may be too good to be true; for eg: A free Airline ticket or a 100,000,000 GBP lottery price.
  • Manage your subscriptions; clicking on the ‘Unsubscribe” option in the spam mail is usually a bad idea. As most email providers these days do not send back “read-receipts”, hackers/spammers send you email from mailing list and wait for you to unsubscribe to confirm that its an email id “in use”. It’s best to just mark them as spam and leave it. You can also create some smart filters which moves emails like these straight to archives or deleted items.
  • Always have a secondary email configured for password-reset instructions. Preferably, a secret email address which you haven’t shared in public forums.
  • For a password reset request, choose security questions and answers that cannot be easily guessed by someone else. For eg: Do not choose a question like, what is your favorite color? and even if you end up choosing this question, Answer does not need to be black or blue always. You can even answer as weird as a cow or an elephant. But yea, do remember what you enter.

5. Keep your browser and other apps up-to-date.

  • Generally companies like Adobe, Microsoft, Google, Apple and few others release software updates and hotfixes and make it available to the end-users for download. These may not be just for new features but also to fix newly identified vulnerabilities with the software. Always make a point to run an up-to-date browser. Ensure your Java and Flash Player are updated to the latest available versions. Likewise, do not ignore OTA (On the Air) software updates on your smart-phone as well. Do update them.
  • As much as possible, do not auto-save your passwords on your browsers.
  • I personally do not recommend a password saving programs as well. However, if you still want to try these softwares, 1password can be a good option. 
  • If you are installing any 3rd party applications to access Facebook or Emails, understand the level of access these applications have on your phones. Well, Mobile and Cloud Security are totally new areas, let us look at them later.
  • When using a public computer, always sign out when your session is complete to prevent other people from accessing your account.
  • Use incognito / Private Browser window while accessing your bank accounts.

Summary:

Your online experience totally depends on how secure your accounts are. For many of us, businesses run on Internet and compromising them will result in a huge impact. Hopefully, this article has helped you with some inputs. Always remember to report when your account is hacked; not just to your friends but most importantly to your service providers like Google, Facebook, Banks etc. They can further block your account before it can be accessed by anyone else. Of Course, the most obvious thing remains, Do not share your password with anyone..!