Windows IP Address Conflict Error – “Another computer on this network has the same IP address as this computer.”

20140509fr-windows-network-ip-conflict-

If you get a message similar to the one above, it means that the network (wired and/or wireless) has mistakenly issued the same IP address to two devices.

This can happen when one device goes to sleep, and the router releases that IP address for use again by another device. Then the original computer (or mobile device) attempts to grab the same IP address. The error message will appear.

The problem can also happen if any of the devices on your network have fixed IP addresses. If the device with a fixed IP address wakes up or is turned on, and requests it’s internally defined fixed IP number, but that number is in use by another device, the error will appear.

The best solution is to turn the device off and then back on (restart). In most cases, this will cause the automatic process of requesting and being assigned the next available IP address (DHCP) to fix the problem.

For a server or other device that has a fixed IP address, you may need to turn those devices on first. Let them get their fixed IP addresses assigned. Then turn on other devices.

Apple MacBook iMac Left Mouse Button Not Working Mountain Lion Mavericks

20140226we-apple-support-tips-500x500

If the left mouse button for your Apple computer stops working or suddenly becomes non responsive for no apparent reason, try this trick to possibly fix the problem.

  1. Using the right mouse button, navigate from the Apple (icon) menu to System Preferences and click on Mouse.
  2. Under “Primary mouse button” switch to the Right mouse button and then switch back to the Left. Try this a couple times (keeping in mind that the alternate button will be primary), and return to Left as the primary (or your preferred button).

This may restore the proper function of the left mouse button.

Free Download of Microsoft Office Professional Plus 2013 Evaluation

20140426sa-microsoft-office-2013-logo-icons

Office Professional Plus 2013 is the future of productivity. Office Professional Plus 2013 includes Word, PowerPoint, Excel, Outlook, OneNote, Access, Publisher, and Lync.

Click here for instructions on how to obtain the download.

Fitbit Responds to Heartbleed Vulnerability

20140428mo-computer-security-news-675x300

(Source: Fitbit Website Article, 22 April 2014)

How is Fitbit keeping my data secure in light of Heartbleed?

LAST UPDATED: APR 22, 2014 02:51PM
On Monday, April 7, 2014, information was made public regarding a major vulnerability in the OpenSSL technology that encrypts much of the internet’s traffic. More information about this vulnerability is available at The Wire.

After patching our servers, we now require all customers to log in again. The next time you visit the web site or mobile application, you will see the login page. If you can’t remember your password, please follow the instructions at How do I reset or change my fitbit.com password?

In addition we strongly encourage all customers to change their fitbit.com passwords after logging in by visiting https://www.fitbit.com/user/profile/edit.

Note that if you change your password on a third-party account that is linked to your Fitbit account (such as Twitter, Facebook, Runkeeper, and other partners), you may need to relink that account with your Fitbit account.
You can review the third-party applications you’ve authorized by visiting https://www.fitbit.com/user/profile/apps.

The nature of the vulnerability makes it difficult to detect malicious behavior that would indicate any customer data or passwords have been compromised. However, we believe these steps are in our customers’ best interests.

More information

Fitbit, like many others, was using an affected version of OpenSSL. We updated all of our severs by 11:00 am (PDT) on April 8th and we are no longer vulnerable. By 5:00 pm (PDT) on the same day, we had also reissued all our certificates with new keys. This is a best-practice safeguard against the possibility of having had our key compromised by this vulnerability.

Note that Fitbit has long configured our servers to utilize forward secrecy whenever possible, further reducing the potential damage that the Heartbleed bug could cause.

Behind the scenes, we have also been busy auditing all of our partner integrations and changing our access keys for any partner that was potentially vulnerable.

New Setup and/or Transferring Mobile Service from iPhone 5s on AT&T to Samsung Galaxy S5 on Verizon

20140421mo-samsung-galaxy-S5-640x300

Overview

These instructions describe the steps involved for setting up a Samsung Galaxy smartphone. This example describes switching from an iPhone 5S on AT&T to a Samsung Galaxy S5 on Verizon.

Warnings and Considerations

Before making a switch from the Apple iOS ecosystem to the Android ecosystem, it’s important to realize that some things that work fine on iOS are poorly implemented on Android or simply don’t work as expected.

  • 1Password. The 1Password app for password management on iOS allows you to enjoy the security of synchronizing your confidential data through a local secure home/work WiFi network. On Android, WiFi sync isn’t an option. So, you’ll need to put your data out in the cloud where it could become compromised.
  • Calendar. In the iOS world, it’s possible to view multiple color coded calendars in one screen/view. The included Android calendar doesn’t permit this. So, you’ll need a third party app to view multiple calendars side-by-side. However, these third party apps don’t support enterprise calendars such as Microsoft Exchange. So, you’ll need a different app for that. However, that other app doesn’t allow viewing multiple calendars at once. So, you’ll be going back and forth between several calendar programs to make this work. For anyone managing multiple calendars, including Exchange calendars, Android is probably not an option.
    • Note that some smartphone manufacturers like HTC will include calendar software that is better than that included with Samsung, but it’s proprietary and only available on devices from those manufacturers.
  • EMail. There are typically two built-in email clients on Android. One is for Gmail and a separate program is for all other email services. The built-in Gmail client doesn’t have a consolidated email inbox, so you’ll need to switch between your Google accounts to view different account inboxes. The other email client doesn’t support enterprise email, such as Microsoft Exchange. So, you’ll need a third email program and an $8 plug-in to make that work. Functionality is limited. For anyone who manages multiple email accounts, including a Microsoft Exchange email, Android is probably not an option.
    • Note that some smartphone manufacturers like HTC will include email software that is better than that included with Samsung, but it’s proprietary and only available on devices from those manufacturers.
  • Fingerprint Sensor. If you’ve been using the iPhone 5S fingerprint authentication to login, you probably noticed it’s very handy to program in multiple fingerprints and unlock the phone, one-handed, with your left or right hand. With the Samsung, this can’t be done. The fingerprint sensor requires that you hold the phone with one hand, and then fully swipe  your finger across the sensor with the other hand. If you have a case (which you should) it will likely make a smooth swipe of your finger more challenging since the sensor/button is near the edge of the phone where most cases have a raised edge. If you’re someone who wants the convenience of one-hand unlock capability and the security of fingerprint authentication, the Samsung Galaxy S5 is probably not for you.
  • Limited Office Suite. If you’re someone who has been relying on the advanced features of the apple productivity software (Pages, Numbers, Keynote), you will find the Android equivalent (Polaris Office) limiting.
  • Multiple App Stores. If you’re used to purchasing music, movies, books, software, and other digital products primarily from a single provider, you’ll find the Android world a bit different. The Google store for digital products is called Google Play. Other programs can be purchased from the Amazon store or the Samsung store. This means that app management isn’t centralized and could get confusing.
  • Removal of SD Card. The Samsung Galaxy S5 has a removable SD card. It would be nice if this were more easily accessible for regularly moving files from the device to a desktop computer (for example). However, to access the SD card, one must snap off the thin (flimsy) back cover of the Galaxy S5. Repeated removal and replacement of the back cover will likely cause it to become less securely attached.
  • Sound. The Samsung phone has a single, small, rear-facing speaker hole. If a finger covers this, the sound is barely audible. Or, this can happen if the device is set flat on a surface or material that might cover the speaker.
  • Water Resistant. There’s a thin gasket that provides “water resistance.” If that gasket isn’t securely seated, the phone won’t be water resistant. As mentioned above, the back cover is quite flimsy and after removing it and replacing it several times it’s likely the gasket won’t serve its purpose as well.

Device Purchase & Service Transfer Process

For the following process you’ll need to have your AT&T account information, including the account passcode which is different than the password. For employee discounts that are offered to some state employees, you’ll need to present an employee ID at Verizon.

  1. Old Voicemail. Once your old phone service with AT&T is cancelled (after porting your phone number to Verizon) you won’t have access to the old voicemail, so be sure to listen to any messages prior to the transfer.
  2. Hardware Purchase Location. Depending on what offers are available, you may find that a Verizon third party agent will have better pricing on devices. In this example, there was a savings of $130 per device when purchasing from Costco ($30 sale on the phone and $100 credit per phone to the Verizon account). You may want to make the initial device purchase at one vendor and then visit the Verizon store if you qualify for a discount that employees of some companies can receive.
  3. Service Transfer. You can request to port (transfer) your old phone number to the new devices and this can be done at any authorized center. However, you’ll need your account security code. This is different than your username and password for accessing your old mobile account. You’ll likely need to provide this information to the Verizon authorized vendor when they transfer your service.
  4. Employer Discount. Employees of some organizations and companies qualify for discounts. You’ll need to visit a Verizon corporate store and present an employee ID card to qualify. Shopping mall kiosks aren’t qualified to assist with this.
  5. Old Phone Rebates. For a 64GB iPhone 5S in good condition, Verizon will pay $350 (as of 21 April 2014). This is a better price than what you might get from Gazelle.com.
  6. Protective Case. The Incipio offering of cases for the Samsung Galaxy S5 are quite good. The DualPro case is a good choice and costs about $30 at a Verizon store. Employees of some companies may qualify for a 25% discount on accessories.
  7. Memory Card. Unlike the Apple iPhone, the Samsung Galaxy S5 allows for the use of a microSDXC memory card to store data. This makes it inexpensive and easy to upgrade the storage capacity on the device. The card is inserted under the back case above the batter, on top of the SIM card. This can be done in the store.
  8. Postpone Google Account Setup. When you initially setup the phone, the sales person will likely ask you to provide your Google Account login credentials (email and password) or create a new account. This will be the primary account for all phone information, communications, cloud storage and synchronization. You may want to skip this step initially until you have more time at home.
  9. Postpone Samsung Account Setup. There is an initial request to setup a Samsung account. You can skip this initially and return to it later. This will save time at the store.

Device Setup

Some steps may be more easily performed while at work and when using a WiFi connection.

  1. Connect to WiFi. The setup process will take less time with a faster Internet connection. Also, this will save on your data plan usage.
  2. Setup Device Login Security. To setup device login security, such as configuring a password, swipe your finger from the top of the screen. Touch the gear icon at the top of the screen (for Setup). Scroll about two pages of options to find Fingerprint (under Personal). Under Settings choose Fingerprint Manager. You can register up to three fingerprints. You will need to enter a password as an alternative for when the fingerprint reader doesn’t work. This needs to be at least four characters and include a letter. It can be all letters, but it’s probably best to create a more complicated login. When done, you will return to the Fingerprint Manager and choose Screen lock. Select Fingerprint as the screen lock authentication/login method.
  3. Setup Google Data Account. You can create a new Google account or use an existing one. This will be the primary account for all phone information, communications, cloud storage and synchronization.  From the main screen, swipe your finger from the top and click the gear (for Settings). Scroll down about two pages to find Accounts. Choose to Add an account.
  4. Setup Google Play Account. It’s helpful to have a single Google Play purchase account shared across multiple devices. You can share this account with family or others you trust to have a single app purchase be shared among devices. Use the other Google account (mentioned above) for everything else. This is similar to the Apple iPhone where you can have one user account for the Apple store and another for iCloud data synchronization. When setting up the shared purchase account, provide a purchasing credit card for the Google store. For this account, it’s not necessary to synchronize App Data, Calendar, Contacts, Drive, or Gmail (unless using a shared email account). However, you will want to sync Books, Movies & TV, Newsstand, and People details.
  5. Configure Amazon. An Amazon welcome screen will appear when you swipe your finger from right to left on the home screen. Enter your Amazon account credentials to setup Amazon functionality on the smartphone including a Kindle reader, Amazon Android Apps, Amazon shopping, and Music.
  6. Location Information. On the home screen you will see a message stating, “Tap here to add a city.” Tap on that message. A message will appear giving you an option to click on Settings. Go to Settings and tap on Google Location Reporting. Under your Google account name, Location Reporting will be off by default. Tap on that message and then slide the switch (upper right) from OFF to ON. This is an example where you’d use your primary Google account (for data) with the location reporting, but not use the secondary (purchase) account. Do the same for Location History. Go back to the main Settings > Location screen and choose My Places (under Location Sources) and set your Home and Work locations based on Map data (preferred). Under Mode you can select High accuracy for very accurate location determination. Once finished with these settings, return to the main screen and tap the “Tap here to add a city” message to have your city automatically identified and listed, then choose it.
  7. Device Name. You’ll likely have multiple phone lines on a single plan (such as a family plan). This is the most economical way to get service. With many “Buy one get one free” (BOGO) offers, it’s likely you’ll have identical phones. To make it easier to identify each phone (for installing apps remotely from the Google Play store), go to Settings (swipe down from top of screen and touch gear). Scroll down about four pages to the very bottom of the list and choose About phone. Touch Device name. Change the name of each device to the name of the primary user of that device (or use some other naming method).
  8. Configure Email Program. Android comes with email software for checking your email account(s). However, Gmail and other email accounts will use two different programs, and the included Gmail software can only display one inbox at a time. Those who want a single unified inbox should consider the free My Secure Email software from Mobile Experts with the My Secure Exchange ActiveSync. The cost of the Exchange compatibility module is $8 per Google Play account. If you have two or more devices sharing the same Google Play purchasing account, the cost is still just $8.
  9. Configure Calendar Software. The included Android calendar software is adequate, but most people will want more advanced capabilities. SolCalendar by SolStudio at Daum is a good choice.
  10. Disable System Sounds. The activity sounds are fun for the first hour or two, but eventually you’ll most likely want to turn them off. Go to Settings > Sound (under Device), Sound Mode, and choose Mute.
  11. Setup Samsung Account. You’ll want to setup a Samsung account for access to advanced features like Find my Phone.

Samsung/Android Features & Advantages

Samsung devices using the Android platform offer some features and advantages over the Apple iOS iPhone. Here are a few.

  • Big Screen. Samsung smartphones offer much bigger screens than what Apple currently offers on iPhone devices.
  • Clear Display. Samsung devices are known for their very colorful, bright, and clear displays.
  • Keyboard. The displayed keyboard shows a full five rows of keys including the numbers and letters (alpha-numeric) options you’d find on a normal keyboard.  On the iPhone it’s necessary to switch between keyboards to access numbers and letters.
  • Operating System. The Android operating system has a lot in common with a desktop computer operating system. In fact, some of the Samsung devices can use a small dock that turns a smartphone into a desktop computer alternative with keyboard, mouse, USB ports, and a large computer display.
  • Removable Battery. Having a removable battery is a nice feature for anyone planning to be away from power for an extended period of time (such as hiking).
  • Removable Memory. Like larger computers, the Samsung Galaxy S5 allows for memory to be removed and easily upgraded.
  • Water Resistant. The Galaxy S5 is designed to be water resistant.  However, care should be given to make sure the USB port remains covered, and the rear cover gasket of the phone needs to be well sealed.

Impact of Changing Service Providers

  • Text Notifications. When you switch service providers, a cancellation message will be sent to the companies that you’ve requested text notifications from. So, for example, text alerts from  your bank will no longer come through. You’ll need to reestablish those subscriptions.

Solution for Gmail Messages in Apple Mail Going to Archive and Unread Message Count Errors

20140226we-apple-support-tips-500x500

The Apple Mail client in Mavericks is reported to have some compatibility problems with Gmail. In some cases, messages are being delivered to the Gmail archive folder and are not showing up in the Inbox. In other instances, the unread / new message count indicator is incorrect. The following steps may help resolve these problems.

  1. Quit Mail if it is running.
  2. In Finder, chose Go > Go to folder.
  3. In the dialog that appears enter “/Library/Application Support/Apple” and press enter.
  4. In the new Finder window that appears there’s a folder called Mail. Drag this folder to the trash.
  5. Restart Mail.
  6. Done!

What these steps accomplish is to delete some of the system settings relating to email. Be sure that you do not delete the Mail folder from your personal user Library. If you’re unsure, get a qualified support person to help you.

__________

Thanks to Makur for discovering the solution to this problem (source discussion thread).

Heartbleed Computer Vulnerability – What you need to know now and how to respond.

20140413su-heartbleed-640x300

On April 13 I had an interview with Justin Andrews of KWWL. We discussed the Heartbleed security exploit and what consumers can do to protect themselves. Click here to view the interview and read the KWWL story. If you have questions about this and other computing security concerns, feel free to contact me. This document was originally posted on April 13 and remains mostly the same as it did originally.

“Considering the long exposure, ease of exploitation and attacks leaving no trace this exposure should be taken seriously.” ~ CodeNomicon

20140418fr-symantec-heartbleed-quote-500x500

Understanding the Heartbleed Vulnerability

Here are some points that should be emphasized regarding the Heartbleed security exploit:

  • Programming Oversight. The Heartbleed exploit was not the creation of hackers. For this reason, it is unlike viruses, malware, spyware, denial of service attacks, and botnets,  It is the result of a programming oversight. Similar security vulnerabilities have been repeatedly discovered in software from Adobe and Microsoft. However, these are usually identified and quickly patched. The Heartbleed vulnerability went undiscovered for two years. This gave hackers a significant window of opportunity to take advantage of the vulnerability and gather information.
  • Impact Unknown. The nature of the exploit, and the fact that it went undetected so long, make it difficult to know the full impact. Organizations and businesses have been reluctant to disclose the impact of the vulnerability because that may expose them to criticism and it also would disclose confidential information about the security and encryption protocols they use. Some companies are coming forward to let consumers know they should change their login credentials.

Taking Action – Summary

This is still a developing story. There’s a growing list of hardware devices that are known to be impacted, such as 50 million Android and Blackberry devices. These will need to be updated or replaced. In general, you should change your passwords on all online user accounts, starting with your email accounts. However, for any system not yet patched, you may want to change your password now and then again after it has been patched.

Change Email Passwords First

As you may have noticed, most online accounts have a “I forgot my password” option that sends a password reset to the email account on file. This means that every website you use can be easily accessed by anyone who has your email account login details. They simply need to review your emails for bank, health, investing, shopping, and other sites. Then, go to those sites and click the password recovery link. It’s that simple. So, your email account is a like master key to all other accounts. For this reason, it should have a very secure password. You may wish to have two or three separate email accounts, with one rarely used that is for higher security purposes. When a security breech like Heartbleed takes place, it’s important to update your email passwords first because updating your other accounts won’t be secure until your email is secure.

Password Manager

Because confidential account information includes authentication questions, account numbers, and other personal identity details, it’s important to have a secure encrypted digital lock-box where this information can be stored. Password managers provide an encrypted database where you can securely store all of your account information. Most have the ability to synchronize data locally (on your local WiFi network) between devices. This makes it more feasible to have complex passwords and diverse authentication questions. An example of a password manager is 1Password by Agilebits.

Strong Passwords

Most systems enforce strong passwords and won’t allow you to use a short, simple, easy to guess, or previously used password. Here are some general guidelines for creating  a strong password.

A secure password should:

  • Be at least 10 characters
  • Have at least two lower case characters
  • Have at least two capital letters
  • Have at least two number
  • Have at least one special character (such as * # % !)
  • Note have multiple identical consecutive characters as a way to make the password longer (such as Password7777777)
  • Not include the account name or account owner name
  • Not be a common password
  • Not be used in the past year
  • Not be the same or similar to any other online account
  • Not be the same as your previous 10 passwords

Tools

These are some of the tools provided to help respond to this bug. It’s reported that 95% of web tools don’t work. So, you shouldn’t rely entirely on these tools, but if one reports that you’re vulnerable that may be a helpful indicator.

Two-Factor Authentication

Some websites now offer two-factor authentication, also known as two-step authentication or multi-factor authentication. These include sites such as WordPress.com and Gmail. In addition to being required to enter your username and password, an additional piece of randomly generated information is required to login. This reduces unauthorized access to accounts.

For example, the Google Authenticator is an app that runs on your smartphone. It is continuously generating random codes that are good for a short period of time before expiring. An active good code is required to access accounts protected by their two-step authentication system.

Websites Impacted by Heartbleed

A few websites have been doing a good job of maintaining lists of websites that were impacted by Heartbleed as well as some that weren’t. There are some websites that we don’t yet have information about. Review the following reports for more details about which accounts may be more vulnerable than others.

Impacted Hardware & Software

A variety of hardware products and systems may be impacted, as well as some software. The articles here offer more information about certain systems that may be impacted. This is not a comprehensive list.

Don’t Be Over Confident

Some companies and organizations have been quick to announce that they aren’t impacted, or that they’ve patched their website.

As you might imagine from the long list of impacted hardware and software above, it’s actually difficult for an organization to have and immediate comprehensive understanding of the impact.

While a company’s website might not have been using OpenSSL, other services they rely on, third party websites, and hardware devices could be vulnerable. That takes time to discover and fix.

Additionally, even if a company’s public-facing website(s) or resources have been patched or weren’t effected, it’s common for users to have the same login and password on multiple systems. So, if they interacted elsewhere with a vulnerable system, the could be impacted.

Regardless of what an organization or company claims, there will likely be some ripple effects and long-term impact of the OpenSSL vulnerability. So, it’s best to be cautious and careful in this regard.

Additional Reading

Further Assistance

If you have questions about this and other computing security concerns, feel free to contact me.

Page Visits

The maps below show recent page visits. Click an image for a larger gallery view.

Apple Mac Computer Slow to Wakeup After Sleep – Progress Bar

20140412sa-apple-computer-sleep-slow-wakup-progress-meter-bar-indicator-640x300

Safe Sleep ensures that data stored in main memory will not be lost should the computer shut down due to the battery being drained completely. Prior to your computer entering sleep, Safe Sleep automatically saves the contents of main memory—such as desktop settings, open applications, and other work in progress—to the hard drive.

There are two situations in which a computer will enter safe sleep:

  1. In the event the battery becomes completely depleted while the computer is asleep, the computer will shut down. But when a power adapter is connected or a freshly charged battery is installed, the computer can be restarted. Press the power button as if turning the computer on and it will automatically return to the desktop state that existed prior to entering sleep. This means that applications and files will remain exactly as they were prior to the computer being put to sleep, making it easy for you to continue with your work.
  2. With the release of the OS X Mountain Lion v10.8.2 supplemental update 2.0, a new feature was introduced to enter safe sleep after four hours of the computer being connected to AC power. This is an effort to comply with the European Energy Standards (ErP Lot6). This will only occur if there is no wireless or Ethernet activity and no activity from external devices such as USB storage devices.

This is normal behavior for the following models:

  • MacBook Pro (Mid 2012 and later)
  • MacBook Pro (Retina, Mid 2012 and later)
  • MacBook Air (Mid 2012 and later)
  • iMac (Late 2012 and later)
  • Mac mini (Late 2012 and later)

(Source: http://support.apple.com/kb/HT1757 from 9 October 2013)

Apple Mail Compatibility Issues with Google Gmail and Microsoft Live Hotmail

20140226we-apple-support-tips-500x500

Cross Brand Compatibility Issues

In their pursuit of customer loyalty, companies sometimes create proprietary exclusive technologies that don’t work well outside a certain brand ecosystem.

For example, Gmail (from Google) and Hotmail (from Microsoft) work great on their respective platforms:

  • Using a Google Chromebook or Android device (available on tablets and phones) you’ll likely have very few problems with Google’s gmail system.
  • Similarly, using Microsoft’s proprietary email clients found in Windows computers, tablets, or phones, it’s possible to enjoy a quality email experience.

However, using products across competing platforms often produces undesirable and unpredictable results.

According to conservative estimates, thousands of people are currently being inconvenienced by the incompatibility issues between the Apple Mail Client and Google Gmail Mail service.

Apple Devices Produce Unexpected Results

Oddly, when using an Apple iOS device (iPod, iPhone, or iPad), users experience exceptional email client compatibility with all features, folder access, and synchronization working properly. Yet, using Apple Mail on an Apple OS X device (laptop or desktop computer), users experience numerous problems.

Apple Mail and Gmail Issues

Here’s what OS X may experience when using Apple Mail with Gmail:

  • Archiving Error. New emails are delivered to an archive folder rather than the inbox.
  • Unread Count Error. Messages read on another device show up as unread on other devices.
  • Speed Issues. Apple Mail may load slowly.
  • Missing Emails. All messages may disappear from the inbox or other folders and not show up for a few minutes (or longer).
  • Synchronization Latency. Services like Apple iCloud, Microsoft Live, and Microsoft Exchange server all allow Push notification so you’re instantly notified of emails, calendar changes, and updated or new contact information. Gmail, unfortunately, requires a Fetch command in order to receive updates.

Apple Support Documents

Here are some Apple support documents relating to Apple Mail compatibility issues with Gmail.

Google Gmail Support Documents

Google offers a document with suggested IMAP settings for various email clients.

  • Recommended IMAP client settings – “All IMAP clients differ, and you can configure your mail client’s settings to best suit your needs. However, to work optimally with Gmail, we recommend certain settings. Click on your client below to view our recommended configuration.”

Jeff Schuette Configuration Document

There is a lengthy document on this subject, with suggestions from Jeff Schuette on how to best configure Apple Mail to work with Gmail.

  • Setting up Apple Mail to Rock and Roll with Gmail – “OS X 10.9 Mavericks has changed how Mail works with Gmail. This article is now only relevant for older versions of Mail. If you have previously followed these directions and have now updated to Mavericks, please see Apple Mail and Gmail Part Deux.”
  • Apple Mail and Gmail Part Deux – “If you followed my tutorial Setting up Apple Mail to Rock and Roll with Gmail, you will need to make some changes after upgrading to Mavericks.”

Further Reading

The following articles document the above issues and in some cases offer possible resolutions or work-arounds. It’s important when searching for articles to read current ones (within the past few months) since older articles may only be relevant for software that’s been replaced or subsequently updated.

  • Apple mail does not sync with gMail – “Today my Apple Mail no longer provides me with my gMail in the inbox. I can send mail to my gMail address and it shows in the Sent box …but it never makes it to my Inbox. If I log directly into Google Mail the email message is there.”
  • IMAP Gmail messages going directly to Archive folder instead of inbox – “Since upgrading to Mavericks, my Gmail accounts have been acting up in my Mac Mail program. At first it was just extremely slow to download the IMAP mail (my other POP email accounts continue to work just fine). However, in the past couple of days, I’ve noticed that incoming mail through the Gmail account randomly goes to my Inbox or to the Archive folder. This is very frustrating and can lead me to missing emails that I need to see. I haven’t changed any settings in Gmail or in the Mac Mail program.”
  • Mavericks Mail App and Gmail folders – “I have installed Mavericks on my MBA. Now in the mail app, when I drag messages from the inbox to a gmail folder, they leave the inbox. But if I click off of the inbox and then click back on it – they reappear in the inbox.”
  • Even after OS X 10.9.2 Mavericks update, users still complaining about Mail issues – “Mail in OS X Mavericks has been the new operating system’s least impressive point. Since launch, users have been complaining about issues relating to Gmail accounts, stability, and overall synchronization. Apple first attempted to patch up these bugs with a fix in early November of last yearâ€Ĥ”
  • Mail App crashes after OSX 10.9.2 update – “Updated to 10.9.2 today, now mail app crashes, Activity Monitor is showing it using 100% usage. It also makes my MacBook Air 2013 very hot.”
  • Apple posts workaround for Mavericks Mail sync issues, no permanent fix yet – “There’s good news and bad news for users of Apple’s Mail app who have been plagued by problems since updating to OS X Mavericks. Apple has acknowledged that users are still having trouble despite multiple updates since a new version of Mail first released with the updated operating system, but the suggested fix is only a temporary workaround.”

Cloud Backup or External Drive Backup? … Choose Both!

20140403th-data-backup-options-1038x675

Cloud backup services and external hard drive backups each have advantages and disadvantages. That’s what makes it hard to decide which one to choose.

By using both systems, you can get all the benefits they have to offer. When you read the list below, you’ll realize that you wouldn’t want to be with only one solution.

Hybrid Backup System

These are the benefits of using a hybrid backup system:

  • Current Data Backup (Cloud & Drive Backup). For people who run an automated backup to an external hard drive on a daily or weekly basis, the most recent data may not always be available. Cloud backup services typically backup and synchronize in realtime as you work. Local backup software can do this as well, but sometimes this isn’t as reliable or could slow down the computer. Larger files, such as videos, may be more likely to get backed up to a local drive sooner than they will with cloud services since uploading gigabytes of data takes time. So, in this regard, both services offer equal benefits.
  • Disaster Recovery (Cloud Backup). In the event of a tornado, fire, flood, or other disaster, it’s important to have an off-site backup. Using a cloud backup service provides this advantage.
  • Image Recovery (Drive Backup). If your computer crashes, how much time will it take to install the operating system, all programs, and reconfigure everything to work again? It could take days, unless you have an image backup in which case it could take about 20 minutes. Image backups are a copy of your entire hard drive at a point in time. When you recover an image, it includes everything on your drive as if nothing ever happened. You can restore an image backup to a brand new drive, even a larger faster drive, and keep working after a hard drive crash. This is what makes an image backup so helpful. You can make an image backup using software like Acronis True Image.
  • Physical Data Security (Drive Backup). If you’re using a cloud service like Dropbox, and have the unfortunate experience of letting go a disgruntled employee, you may wake up to find all of your data is missing — if you’ve not quickly changed the password required to access the cloud account and disconnected any shared access. Or, even in a situation where the login to your cloud storage gets compromised, a malicious hacker could delete all the files. With a local hard drive backup, a person would need physical access to your facility to get at the data.
  • Recovery Speed (Drive Backup). We all know that it can take many hours to download files from the Internet. Recovering an entire hard drive of data can take hours or days depending on your connection speed. Using an attached hard drive is much faster if you’re restoring data after a system crash.
  • Reliability (Cloud Backup). A cloud backup is an independent system and can alert you via email if something is wrong. However, an external hard drive backup can fail for any number of reasons without you necessarily being aware of it:
    • If a user disconnects the drive (by ejecting it in Windows), the back software won’t run as scheduled.
    • If the external drive has the power cord accidentally unplugged, or if the power adapter fails, the backup won’t run.
    • If the external drive data cable becomes disconnected, the backup won’t run.
    • If the external drive fails or crashes, the backup won’t run.
    • If the backup software freezes up, or stops running properly, the backup won’t run.
  • Theft Prevention (Cloud Backup). If someone breaks into  your office or store, and takes your equipment along with your backup drive, you will have lost all your data. In this regard, a cloud backup is helpful.

What’s Required?

To create your own hybrid solution, begin using a cloud synchronization service like Box.com to have a shared folder across your business computers. You could also choose to use a service like Carbonite for cloud backups and share the files through your local network (instead of using cloud-sync sharing). Then, on one of those computers, connect an external drive for backups. You could use the backup software included with Windows or purchase something like Acronis True Image.