You can put any Mac with an IR receiver, docked iPod (with IR receiver) or AppleTV to sleep by pressing and holding the Play/Pause button. Maybe you get the idea.Ī couple less intuitive secrets about the remote: In iPhoto, you can advance a photo with the next button on the remote. In Keynote, you can advance a slide with the remote. If you haven’t, for example, in QuickTime player, you can use the pause, forward, backward and volume up/down buttons to control a movie playing. If you of are the more curious type, you might have already discovered that within a lot of Apple applications, you can use the remote. You can use your Apple Remote to enable or disable the alarm, and it will chirp like a car! iAlertU is free, and available for download from SourceForge. When motion is detected, the alarm is triggered, and it will even capture images from your iSight of the perpetrator. Since the introduction of the Sudden Motion Sensor, developers have found clever ways to implement the accelerometer in their applications. This is basically an accelerometer which detects any sudden movement and will stop spinning the hard drive if enough movement is detected to protect it from being damaged in the fall, thus saving your data. If you have purchased a laptop since 2005, there is a very good chance it has a ‘SMS’ or Sudden Motion Sensor. Today, I’ll show you three ways you can better use it, if your were lucky enough to get one for free, or recently paid for one. It’s the old J Edger “Hoover up all the dirt that’s fit to blackmail with” technique brought upto date.Yesterday, my article discussed the Apple Remote being removed from the box inside new Macs. There is a chance that your pictures could end up sitting in a folder with your name and number on it just waiting for you to be turned at some point… History shows that the human MICE faillings are a good way to get people to act for a foreign power. Oh and APT has been around for a while and we know that all Superpowers and many first world nations are into cyber-espionage in one way or another. Nice and covert and no way for you to know it’s happening. There job would be way eaaier if as with the CarrierIQ debacle the software you used sent the photos etc to the Internet and they just snagged a copy in passing. Which brings us to the next point, as we know because of the very loose lips of certain USGov entities both the Dutch and Israeli sigint agencies have taken opportunity to activate the cameras on laptops of foreign nationals especialy those in their governments employ. Whilst we do not know for certain the press certainly assumed it was taking pictures of the students in their bedrooms etc.īut the other issue is do you want to be photographing yourself in various states of dishevelement and having it uploaded onto various “cloud” devices from the PC or phone you send them to? After all if Celebs get their selfies hacked there is no reason for others likewise not to have their photos hacked.Īlso even if you use SSL etc the chances are the SigInt agencies will get to keep copies untill hell has not just frozen over but turned to metalic hydrogen. The notable feature of the software was it took photos. What could possibly go wrong?Ī better question would be “What could possibly go ALL,Īnyone remember back to when there was a lot of upset because a school technician installed anti-theft type software onto the school machines that the kids had to take home to do homework on. Let’s see… a remotely-accessible screen capture and keylogger.
0 Comments
Leave a Reply. |