Category Archives: Uncategorized

How To Add Second Person To Unlock Your iPhone With Face ID

Face ID on the iPhone X lets you unlock your smartphone with your face, but it’s limited to just one person. That changes in iOS 12. Now you can add a second face so someone else can unlock your iPhone, too. Here’s how to set it up.

Face ID is a feature introduced in iOS 11 on the iPhone X that scans your face instead of your fingerprint, like Touch ID, to unlock your phone and authenticate purchases. Touch ID supports multiple fingerprints, but prior to iOS 12 Face ID supports just a single face.

iOS 12 lets you add a second face to Face ID, but hides the feature under what Apple calls “Alternate Appearance.”

To add a second person to Face ID in iOS 12 do this:

  • Launch the Settings app
  • Tap Face ID & Passcode
  • Enter your passcode
  • Tap Set Up an Alternate Appearance
  • Tap Get Started

iOS 12’s hidden settings for adding a second person to Face ID

It’s likely that Alternative Appearance is designed for people who have difficulty with Face ID because of more significant changes in appearance due to changing wardrobes like glasses or hats — but it has the happy coincidence of supporting a second person as well.

Here’s the caveat: You can’t remove just one face from Face ID. If you decide the person you added to your iPhone shouldn’t have Face ID access any more you’ll have to reset Face ID completely and start over.

Source Link

 

How to Make a Group Face Time Call on iOS 12

Back in June at WWDC, Apple introduced iOS 12 with a long-awaited Group FaceTime feature that’s designed to let you chat with up to 32 people at one time using a unique tiled interface that’s new to FaceTime.

Apple ultimately removed Group FaceTime from the public iOS 12.0 release, but it’s back in iOS 12.1, which was released on October 30 during Apple’s New York event.

Group FaceTime is relatively easy to use, but it may not be immediately obvious how a call is initiated nor how all of the group chat options work, which is why we’ve taken an in-depth look at the new feature. To use Group FaceTime, all participants must have iOS 12installed.

Placing a Call

There are two ways to initiate a Group FaceTime call, using the FaceTime app or the Messages app.

FaceTime App

  1. Open up the FaceTime app
  2. Tap on the “+” button in the upper right-hand corner.
  3. In the “To” field, type a name and tap it.
  4. Type another name.
  5. Continue typing in all of the names of the participants who you want to chat with.
  6. When ready to place the call, tap on either the audio or the video option and participants will receive a popup letting them know that you want to FaceTime with them.

Messages App

  1. Open up an existing multi-person conversation or create a new iMessage chat thread.
  2. At the top, where the names of the chat participants are listed, tap to bring up a menu bar.
  3. Choose the “FaceTime” option to transition from a text-based conversation to a video or audio call.

The Messages FaceTime interface works with just one person or with a group of people, and it’s perhaps the easiest way to initiate a multi-person FaceTime call.

Receiving an Incoming Call Request

When a Group FaceTime chat is initiated either via FaceTime or through the Messages app, you will get a notification letting you know that a FaceTime call is initiating, which you can tap to join.

 

Joining an Existing Group FaceTime Call

When you’re in a group chat in the Messages app and someone initiates a Group FaceTime conversation, any person in the chat can join the call at any time.

In the Messages interface, there’s a chat popup that lets you know a call is ongoing, with a “Join” button available and the number of people active in the conversation.

Joining a conversation is as simple as tapping that “Join” button, which automatically adds you to the call. There’s no approval interface, so be aware that if you’re in the middle of a conversation, anyone from a group Messages chat can interrupt and join in.

While in a Group FaceTime call, you’ll also see a chat bubble that lets you know how long the call has been going on.

Adding Another Person Through FaceTime

While in a FaceTime call, you can easily add another person to the chat.

  1. In an active call, tap on the icon that features three dots.
  2. Tap on “Add Person.”
  3. Choose a name from the list to send them a notification to join in.

Leaving a Group FaceTime Call

As with a standard FaceTime call, exiting a Group FaceTime chat is as simple as tapping the big red “X” button to end the chat.

Focusing on Chat Members

All Group FaceTime calls are displayed with a tiled interface that highlights the person who last spoke. If you have a call with multiple people, you’ll see tiles of various sizes focusing on main participants, with those who haven’t spoken recently minimized in small tiles.

You can double tap on any person’s tile to make it the focal point in your FaceTime view, enlarging the tile to its biggest possible size. Tap again to go back to the standard tiled view.

Applying Effects

In addition to multi-person FaceTime calls, iOS 12 adds a new FaceTime effects camera that you can use while chatting. While in a FaceTime call, tap on the star-shaped icon to the left of the end call button to access options that include Animoji and Memoji, filters, stickers, shapes, and text.

Multiple effects can be applied at once, which are displayed to all chat participants. The people you’re chatting with can also choose different effects to use, leading to chats filled with different Memoji and Animoji characters.

Memoji and Animoji are limited to devices with the TrueDepth camera system.

We did a detailed how-to on the Effects camera in the Messages app, and it’s essentially the same for FaceTime, so make sure to check that out for additional details on how to use this new feature.

Source link

 

7 best features in MacOS Mojave

MacOS Mojave is now available.

Apple unveiled the newest version of the Mac operating system at its Worldwide Developers Conference (WWDC) in June but finally released it to the public in September.

MacOS Mojave is a free update to Mac users, and it’s a pretty big upgrade. Not only will it help you stay organised and get work done more efficiently, but it also features several aesthetic choices to make using a Mac more visually pleasing.

Take a look at the 7 best new features in MacOS Mojave:

  1. Dark Mode

The Mac finally has a true dark mode thanks to macOS Mojave. Just toggle it in your System Preferences app.

The new Dark Mode affects the entire system, from Apple’s own apps like Photos and iTunes to all of your windows and filters. It even works in Apple’s programming environment Xcode, which makes coding much easier on the eyes.

  1. Stacks

We could all use a little help staying organised.

In macOS Mojave, a new feature called “Stacks” instantly organizes all the random contents on your desktop into neat little batches of documents located on the right side of the screen. Stacks can be arranged by file type, date, or tag.

If you click on a stack, you’ll see all the contents. From there, you can double-click to open a document or click the stack again to put everything away.

The best part is that your stacks will stay organised, regardless of how many documents you add to your desktop. If you continually take screenshots, for example, macOS Mojave will automatically categorise them for you, rather than scatter them everywhere.

  1. The all-new Mac App Store

Apple redesigned the Mac App Store from the ground up for MacOS Mojave.

The biggest changes are visual: Now you’ll see auto-playing videos, and even articles, about popular apps in the store, so you can learn more about apps before you download them.

The new Mac App Store also offers new ways to find apps. The new Discover, Create, Work, Play, and Develop tabs help you explore the apps you don’t have, or get more out of apps you already have.

  1. Better screenshot tool

MacOS Mojave makes it easier to record whatever’s on your screen.

While it’s still just as easy to take single screenshots, Mojave introduces a screengrabbing menu with recording tools like a countdown delay timer, the ability to show or hide the cursor in the shot, and new ways to quickly share and organise your screenshots.

  1. Continuity Camera

Apple made Continuity, its system that lets you pick up where you left off on other Apple devices, much more powerful in MacOS Mojave.

In MacOS Mojave, if you’re working on a document on your Mac but want to add a photo, it can automatically activate the camera on your phone – and when you snap that photo, it automatically appears in the document on your Mac.

This feature, called “Continuity Camera,” works for documents and receipts, too, in case you need a quick PDF. It also works in a variety of Apple apps, including Mail, Notes, Pages, Keynotes, Numbers, and more.

  1. Quick Look

Quick Look lets you perform specific actions on files or documents without needing to actually open an app.

In MacOS Mojave, you can use Quick Look to invoke Markup tools, like adding your own signature, rotating and cropping images, and even editing and trimming videos.

  1. Added security

Apple devices are known for their excellent security, but MacOS Mojave gives users even greater control of their data.

In MacOS Mojave, apps must get your approval before they can access your Mac’s camera or microphone. This is also true if an app is trying to access your Messages history or Mail database.

Also, Apple will now protect more aspects of your data – by default – in macOS Mojave. With Apple’s new Intelligent Tracking Prevention system, comment widgets at the bottoms of articles, Like and Share buttons, and sites that use cookies to track you without your knowledge will be “shut down,” according to Apple. You’ll have the option to allow these fields if you want them.

Source link

 

 

Ato Ransomware

Beware of malware and ransomware

Cybercriminals use a variety of ways to trick you into clicking on links or opening attachments that install malware or ransomware on your computer systems. These criminals may even pose as potential clients.

The malware or ransomware allows them to access your files or block you from accessing your files until you pay a ransom. Paying the ransom does not guarantee you access or that scammers will not demand more money.

 

To help protect your practice, use the following tips:

  • do not open attachments or click on links in unsolicited or unfamiliar emails, SMS or social media messages
  • ensure your computer security systems are up to date with anti-virus and anti-spyware software
  • use a firewall to block unauthorised access
  • secure your wireless network and remote accesses
  • do not allow thumb drives or other removable media to be plugged into your network unless trusted and checked for viruses
  • maintain regular physical backups kept separate from your network
  • only visit reputable websites.

https://www.ato.gov.au/Tax-professionals/Newsroom/Your-practice/Beware-of-malware-and-ransomware/

 

Apple iOS Devices Vulnerable to Image Based Malware

AppleRansomCisco researchers have discovered vulnerability in the way that Mac devices process image formats.  TIFF image files are data rich and typically used by publishers or designers, unfortunately, these images can contain more than just image data.  Because of how Apple processes image data, TIFF files can be used to run malware automatically, without being detected.

While TIFF images impose the greatest risk from this vulnerability, the Cisco researcher stress that it is not exclusive to that file format. OpenEXR, Digital Asset Exchange file format XML files, and BMP images are also vulnerable to the exploit.  The problem stems from the way that many applications bundled into the Apple operating systems use and display data.  iMessage for example, a basic instant messaging app, automatically attempts to render images once they are received.  Since large format image files are designed to contain more than just pixel information, it is possible to conceal links and executables within them.  Once received, the malware contained within these images can activate even without the users consent.

The remote code execution vulnerability has been shown to effect iOS, Mac OS X, tvOS and WatchOS.  The good news is that Apple is already aware of the vulnerability and has issues patches to address the issue.  All Apple device users should upgrade to the latest versions of their operating systems – iOS 9.3.3, El Capitan 10.11.6, tvOS 9.2.2 and watchOS 2.2.2 – to stay safe.

– Richard Keene

IT Computer Support of New York

Webmaster and Lead Designer

 

Small Business and Home IT Support Pagewood

Computer Laptop Repair Services Pagewood

Reliable Computers does it all, repairssupport and all services related to computers. Our company is manned by the finest technicians around with a total of 25 years’ experience in the IT industry.

Reliable Computers offers business owners and residential customers a one-call solution for all of their computer needs.  We also offer IT Consulting Services to better handle your IT needs and show you how you can use the latest technology to maximise the productivity.

Computer Repairs, Service and training support are just a phone call away. We have a shop front that offers both drop-off and onsite repair services, which allows our clients the flexibility to find a computer support SOLUTION that works best for their needs.

Our technicians are Microsoft Certified & fully trained to match with your needs to provide excellent services. Because a high skill and knowledge level is needed to stay abreast of this constantly changing field we only employ Certified Computer Technicians so you can be sure your systems are being repaired by knowledgeable professionals.

We specialise in the following computer services in Pagewood:

  • Business IT Support
  • Onsite computer Support
  • Managed IT Services
  • Computer Networking
  • Laptop Screen Repair and Replacement
  • Laptop Repairs
  • Apple Repair
  • IT Services
  • Computer Services
  • IT Solutions
  • IT Consultant
  • Computer Maintenance
  • Data Recovery
  • Data Backup
  • Internet Setup
  • Virus Removal
  • Spyware Removal
  • Remote Access Computer Support
  • Computer Training

Why choose us for your IT Support ?

  • Specialised in small business & home IT support
  • Fast action for urgent Computer and Laptop Repairs
  • On-demand and Remote Support available
  • Certified Experienced Technicians
  • Friendly Professional Service
  • Same Day Support
  • Fast, Reliable & Affordable
  • Sales, Service & Upgrade of all Major Brands
 

Redshitlineindia virus ransomware decrpytion

How we got our files Decrypted by Redshitline@india.com Virus Ransomware

Our client’s server was infected by Redshitline@india.com Virus Ransomware and all most of the files were encrypted.

This happened on a 4 day long-weekend, all 4 backups were encrypted, no shadow volume or restore point. Tried everything we could find on the Internet without any luck. Finally decided to email the hackers (redshitline@india.com) with an encrypted file attached.

Got a reply back in few hours with the decrypted file attached and the following email:

Hello! Your files have been encrypted with cryptographic algorithm!
We suggest you purchase a decoder which
decrypt all your files in a fully automatic mode on the same day after
payment! (You not need to send any files to us). As we can guarantee – we can
decrypt files for free (2-3 total weight <= 5mb). For warranty
decryption (if required) you should send to us archived
test files in the response letter (even if you did it before).
The cost of the decoder: 5 bitcoins (BTC).

Payment instructions:

1. Go to https://localbitcoins.com/
2. Register (sign up)

3. You need to buy Bitcoins from people. (You can pay with any method,
which is convenient to you)

4. Send purchased Bitcoins to our address listed below. If you have any questions, you can contact support this service, or email us.

Our Bitcoin wallet: 11111111111111111111111111111111111111

The guarantee to decrypt.
1) I give decrypted files for you, and you see – I have decrypter.
2) Making personal decoder for you – it takes just 3-5 minutes. After payments – everyone gets a personal decoder without exception.

Write if you have any questions about the case. There is no bidding, requests to give free decoder and other unnecessary questions – will be ignored.

According to the amount payable. Price for this day – 5 bitcoins, it will be relevant for two days, starting from you wrote to me. After spending two days – the price of the decoder will increase every day on 1 Bitcoin.

It mean, for example, after 4 days from the time you contact me, if you still have not paid the decoder – the amount will be 7 bitcoins. (except for two days without a price penalty)

 

We tried to negotiate with Redshitline@india.com but they didn’t budge.

We created a bitcoins account to buy the bitcoins for the first time. We thought it will be as easy as paying someone and buying the bitcoins by one bank transfer.

To our surprise we had to prove that we are genuine people buying to buy the bitcoins in a legit way. We had to email out drivers licence, Medicare card and photo clicked in different angles. Also hold a paper with the reference number and the amount being transferred.

We end up buying 2.5 bitcoins from one guy and 2.5 from the other as could buy maximum of 2.8 in the first go (it does increase after your first purchase though). Most of the seller’s prefer cash deposit in the their account, but we were looking for sellers who will accept bank transfer. Took us 2 days to get all 5 bitcoins.

Transferred 5 bitcoins in wallet address provided in the email. Emailed them informing about the transfer. We got the following reply back:

http://rghost.ru/private/8RtCmFWwL/76e681a1dfd6fde08e03c99145eee60b
Its your decrypter. Just press the button “Scan PC” and wait for the scan to finish, then send me the key, which you will see on this basis – I’ll make you another key. When I send you – your personal key, you press the button – “Decrypt…”, enter your personal key, and click “OK”. Ticks – no need to clean up.
You need to remove the virus from your PC after decryption. Download any anti-virus and scan all your PC, and remove it. I advice you – DR.Web Cure IT. Waiting for key!

 

We followed the instructions and emailed the key as requested. We got the following reply back in few hours:

Ah, see, we have statistics for each computer, my boss said – that the information on the computer is estimated at more than 10 Bitcoins. He said to tell you that we can sell you the decryption key – just for 4 Bitcoins. If you want to buy – send this amount on my Bitcoin – if not, I am sorry, because the boss checked the value of your files and does not allow me to send key now.

https://www.sendspace.com/file/v0t0ek
– it’s your personal key for decrypter.
If you want to pay 4 BTC – I send the password for archive with key – instantly after payment.
Sorry, I can not go against my boss, coz I lose my job. I do not have to do with the money that you send us, I do not have access to them, I am working on the payroll as well as you, and I do not care how much money you send, I have from this nothing, but the boss does not allow to send the key for such a small sum, arguing that checked your computer at our statistics via your ip address – the number of encrypted files, and said that there is information on more than 10 Bitcoins, but will sell to you for 4 Bitcoins decoder, since you already paid for earlier, and we do not want to put you in an awkward position. If you are going to pay – write to me. Price 4 BTC will be available today. Its one way to get decrypter, have money – you will get it.

 

We were fuming after reading that email, first of all we have paid a lot of money to decrypt the files and now they want more. Secondly if we pay them again what’s the guarantee Redshitline@india.com wont ask for more later. We had no other choice but to pay them.

We had to go through the same exercise of buying more bitcoins, proving your identity to the seller. We paid them and informed about the transfer. We got the following email back:

Ok, I see.
Do it again:
http://rghost.ru/private/8RtCmFWwL/76e681a1dfd6fde08e03c99145eee60b
It’s your decrypter. Just press the button “Scan PC” and wait for the scan to finish, then send me the key, which you will see on this basis – I’ll make you another key. When I send you – your personal key, you press the button – “Decrypt…”, enter your personal key, and click “OK”. Ticks – no need to clean up.
You need to remove the virus from your PC after decryption. Download any anti-virus and scan all your PC, and remove it. I advice you – DR.Web Cure IT. Waiting for key!
PLEASE, write under message: (I make 2 payments), thanks!

 

So we followed the instructions and emailed the key again mentioning that its our second payment. Got a reply the next day with the decryption key. We were a bit sceptical whether the decryption key is going to work to not. Left it running overnight and success in the morning. All the files were decrypted and readable again.

We formatted the Hard Drive and installed all the Programs and made sure that the files were clean before we reloaded them on the server

After $5400 they were back in business.

The moral of the story is: To backup often, keep multiple copies and have a strong backup solution.

 

Vineet Gurmukhani

Reliable Computers

www.reliablecomputers.com.au

 

 

Want Windows 8 to look like Windows 7 ?

If you have a Windows 8 laptop or desktop and you’re not happy with it, we can help: this is our most popular solution.

Reliable Computers Windows 8 Start Menu

Get a Start menu add-on
Another InfoWorld review written by Serdar Yegulalp has enjoyed a surge of traffic since the holidays: “9 Windows Start menus for Windows 8.” Yes, these add-ons bring the Windows Start menu back to Windows 8, which you can use in place of the Modern UI.

In fact, most of these Start menu apps enable you to log in directly to the desktop and bypass the Modern UI entirely. Four come very close to restoring the Search functionality of the Start menu as well, according to the review. There are a number of different styles, but most of the Start menu apps are free and none cost more than a few bucks, so you can download and test-drive until you find one you really like.

Remember, people who say “the desktop is just one click away” from the Windows 8 Modern UI ignore an important point: You have to keep going back to the those tiles to do the things you once did with the Start menu. Can’t stand the Modern UI? Then get a Start menu add-on. Contact us for a start icon today.

 

Spam Mail Prevention Service

We have a scalable, reliable and affordable hosted antivirus and spam email protection service for Business and Residential Clients alike. Compatible with any email infrastructure, with highly effective cloud-based filtering that blocks spam and email-borne threats before they reach the network, this service also includes an integrated continuity feature.

 

Email continuity
The built-in integrated queuing and on-demand email service provides a simple yet highly valuable means by which customers can access email even when their own email infrastructure is offline – we can tell you that this is hugely valuable when customers have a need for it.

Scalability and reliability
The use of multiple systems at multiple datacenters means superior scalability and amazing reliability that you won’t get with an on-premise solution.

Industry-leading virus protection
This provides a unique combination of technologies to defend against email-borne threats, including zero-hour antivirus defense, virtualization-based malware detection technology, and traditional signature-based antivirus engines – together resulting in unmatched malware defense and spam protection.

Easy and affordable
With a straightforward per-user-per-month pricing structure, no start-up costs and minimal or no training requirements, it’s not surprising that so many of our own customers are using this tool.

We will be happy to get you going with a FREE 30 day trial whenever you’re ready.

Click Here to contact us for more information.