Category Archives: Links

Here you can find usefull links

2012 Apple MacBook Pro 820-3115 no green light no power short on PP3V42G3H

Today I was working on the older 2012 MacBook Pro 820-3115 logic board with major liquid damage without any power and no green light on the charger.

Found short on PP3V42G3H line. Replaced the U6990 power chip that caused the short. Ultrasonic the board and Mac powered up without any other issues. Another happy ending.

If you have any questions related to logic board repair please call 561-727-5735. We are located in the heart of West Palm Beach, close to CitiPlace, downtown.

2012 MacBook Pro 820-3115 liquid damage logic board repair

Today I was working on the older 2012 MacBook Pro 820-3115 logic board with major liquid damage without any power and no green light on the charger.

Found short on PP3V42G3H line. Replaced the U6990 power chip that caused the short. Ultrasonic the board and Mac powered up without any other issues. Another happy ending.

If you have any questions related to logic board repair please call 561-727-5735. We are located in the heart of West Palm Beach, close to CitiPlace, downtown.

Apple updates Macs for first time without asking — to foil hackers – CNET

Apple updates Macs for first time without asking — to foil hackers
Apple is pushing out its first automatic security update to protect your computer from being taken over.
by Rich Trenholm

Apple patches Bash vulnerability on Macs

New Apple-focused malware uses Macs to infect iPhones
Apple downplays threat posed by Masque Attack bug
Apple iOS bug lets fake apps sneak onto iPhones, iPads
Apple mops up iOS mess with new update
Apple pulls Apple TV update amid bricking complaints
Speaking to Reuters, Apple spokesperson Bill Evans described Monday’s update as “seamless” and noted that Mac users don’t even need to restart their computers.

Apple isn’t the only company that could be vulnerable to the security bug, which was revealed Friday by the US Department of Homeland Security and the Carnegie Mellon University Software Engineering Institute. Researchers warn that vulnerabilities in a computer’s network time protocol (NTP), which sync a computer’s clocks, could allow hackers to take control of a computer remotely.

“Apple’s proactive steps to automatically remediate this particular vulnerability shows the need to quickly patch remotely exploitable vulnerabilities,” says security analyst Ken Westin of Tripwire. “However, the use of Apple’s automatic deployment tool is not without risks, as even the simplest update can cause problems for some systems. In this case the update may have been so minor the risk of affecting other applications and processes was minimal.”

Previously, Apple’s security updates have required a computer user to accept the update. The company has actually had a method to automatically update computers for two years but is only now using it for the first time.

What if someone doesn’t want automatic updates? Westin advises: “If you have a Mac system where an automatic update might introduce a problem — or you are the paranoid type — it can be disabled by going to the Apple Menu > System Preferences > App Store and unchecking Install system data files and security updates.”

Apple did not immediately respond to CNET’s request for comment.

Tags: Apple Security Computers

via Apple updates Macs for first time without asking — to foil hackers – CNET.

Mac OS X Yosemite sends location, search data to Apple [Updated] | Ars Technica

While privacy advocates lauded Apple for the company’s decision to default to encrypting data on its latest mobile operating system, iOS 8, the technology firm faced criticism on Monday after independent researchers discovered that its latest operating system, Mac OS X Yosemite, is configured to send location and search data whenever a user queries Spotlight.

Spotlight is the company’s search feature for Mac OS X. The capability doesn’t just search a user’s computer, though; it also sends information to Apple and Microsoft to return searches from the companies’ services, according to Fix-MacOSX.com.

“When you use Spotlight, your search queries, the Spotlight Suggestions you select, and related usage data will be sent to Apple,” the company’s “About Spotlight & Privacy” document states. “If you have Location Services on your device turned on, when you make a search query to Spotlight the location of your device at that time will be sent to Apple.”

While the behavior is publicly noted in the Apple’s terms of service, most consumers will not have read those documents, according to Fix-MacOSX.com. Ashkan Soltani, an independent researcher and consultant, confirmed the behavior, labeling it “probably the worst example of ‘privacy by design’ I’ve seen yet.”

Users don’t even have to search to give up their privacy. Apple immediately sends the user’s location to the company, according to Soltani.

Update: Apple answered the criticism in a statement sent to Ars Technica, saying that the company had constructed the search feature to protect users’ privacy:

For Spotlight Suggestions we minimize the amount of information sent to Apple. Apple doesn’t retain IP addresses from users’ devices. Spotlight blurs the location on the device so it never sends an exact location to Apple. Spotlight doesn’t use a persistent identifier, so a user’s search history can’t be created by Apple or anyone else. Apple devices only use a temporary anonymous session ID for a 15-minute period before the ID is discarded.

We also worked closely with Microsoft to protect our users’ privacy. Apple forwards only commonly searched terms and only city-level location information to Bing. Microsoft does not store search queries or receive users’ IP addresses.

The company noted that users can turn the functionality off. To halt Mac OS X Yosemite from sending location and search data, you need to take the following steps, according to Fix-MacOSX.com:

Disable “Spotlight Suggestions” and “Bing Web Searches” in System Preferences > Spotlight > Search Results.

Safari also has a “Spotlight Suggestions” setting that is separate from Spotlight’s “Spotlight Suggestions.” This uses the same mechanism as Spotlight, and if left enabled, Safari will send a copy of all search queries to Apple.

You’d be forgiven for thinking that you’d already disabled “Spotlight Suggestions,” but you’ll also need to uncheck “Include Spotlight Suggestions” in Safari > Preferences > Search.

Original Article can be found here:

http://arstechnica.com/security/2014/10/mac-os-x-yosemite-reportedly-leaks-location-search-data/

AdwCleaner – One-Click Malware and Toolbar Removal – Technibble

AdwCleaner – One-Click Malware and Toolbar Removalby Husayn JamalAdwCleaner is a small, portable and freeware program that can easily remove stubborn toolbars and other malware from your client’s computer. As a technician, you may have encountered a client with an endless sea of browser toolbars and add-ons that they never used or even meant to install, but came with that latest update to Java or some other software. AdwCleaner allows you to remove these toolbars and other hidden malware in a single click.In some cases, antivirus programs, third-party uninstallers, or maybe even the built-in Add/Remove Programs feature can remove these pesky toolbars and other bloatware, but when they can’t, AdwCleaner’s one-click scan becomes very useful. The scan took about 40 seconds to complete on my Windows 8 Virtual Machine, and was able to completely remove the Ask.com and Conduit toolbars from Internet Explorer and Google Chrome.After launching AdwCleaner, click “Scan” and the program will search your client’s computer for any toolbars or malware that may reside there. After the scan has completed, it will display a log showing files, shortcuts, registry entries, and more. You can then de-select which items should not be removed and click “Clean” which will instantly remove the selected files. Alternatively, you could try using AdwCleaner’s Uninstall option first.Beyond what is described above, AdwCleaner does not have any extra features, but it is a very accurate and specialized tool for the removal of potentially unwanted programs and toolbars. One thing worth mentioning is that from the Tools menu, you can view the quarantine and download a separate program called “Hosts Anti-PUP/Adware” which will limit your client’s ability to download toolbars and other potentially unwanted programs again as it will block access to certain websites. This program can always be uninstalled at a later time if required.

via AdwCleaner – One-Click Malware and Toolbar Removal – Technibble.

Google Makes Up 25% of Internet Traffic

Google makes up 25% of Internet traffic

Google accounts for a quarter of all American Internet traffic and is growing faster than the Internet itself.

Americans do a lot of Googling.
Google (GOOG, Fortune 500) accounts for nearly a quarter of Internet traffic in North America, according to a recent study conducted by analytics firm DeepField. That makes Google’s Internet presence bigger than Facebook (FB), Netflix (NFLX) and Twitter’s combined, according to the report. During a few hours of each day, Netflix will eat up more bandwidth than Google, but the streaming video site’s peak traffic occurs just during “prime-time” hours — Google still averages a larger chunk of Internet traffic during the entire day.

The most stunning revelation from the survey is that Google is growing faster than the Internet as a whole. In 2010, Google represented just 6% of Internet traffic.
That’s because the study found 60% of all Internet-connected devices interact with Google servers during the course of an average day, including some gadgets you wouldn’t think would be talking to Google, such as game consoles and home media devices.
A big part of Google’s massive Internet presence and alarming growth comes from mobile devices. The company commands the largest chunk of the smartphone and tablet markets with its Android devices, and those devices all regularly check in with Google for updates throughout the day. Smartphone runner-up Apple’s (AAPL, Fortune 500) default search engine is Google, which adds to Google’s Internet traffic share.
Related story: Google’s profit squeezed by growth in mobile
YouTube’s data-heavy videos also play a role in Google’s large internet share, DeepField said.

Google Street View climbs Mt. Fuji
Google’s expanded internet presence has required the company to constantly build out its server capacity to handle the influx of traffic. The company has been spending more than $1 billion each quarter over the past few years on infrastructure investments.
“While it is old news that Google is big, the sheer scale and dominance of Google in the Internet infrastructure has significant implications on network design and evolution,” Deepfield’s Craig Labovitz wrote.
Google spokeswoman Liz Markman noted that its server improvements allow Google content and services to better reach consumers and deliver data-heavy streams such as YouTube videos more efficiently. The company had no comment on the DeepField study.
The DeepField report is based on a large cross-section of Internet traffic, collected from North American Internet providers. It covers roughly one-fifth of Internet traffic throughout the region, and Deepfield believes it to be the largest ongoing study of its kind.

via Google makes up 25% of Internet traffic – Jul. 23, 2013.