Continued

Transcription

Continued
Nov/Dec ‘05 /Jan ‘06 Edition
Articles
•Apple Unleahes an
Onslaught of October
Announcements
Cover
by Monte
F
Apple Unleashes an
Onslaught of Ocotber
Announcements
Ferguson
ALL HAS BEEN A BUSY SEASON
for Apple this year. They’ve recently
announced the iPod
•GRAMUG Meeting
nano and Motorola’s
Highlights
ROKR, an iTunes
Page 2
enabled phone. But
they weren’t finished
•Product Review
with announcements
Take Control eBooks
just yet. No, Apple
Page 3
released a slew of new
products in October,
•Reality and Digital Pictures both hardware and
Page 5
software. There were so
many product updates,
•For Your Eyes Only: Virtual and new product
Private Networks
announcements you
Page 7
would have thought a
MacWorld Expo was
•Cleaning House in iTunes going on in October.
Page 9
The day after its latest financial announce•Why DRM Offends the
ments, Apple had
Sensibilities
sent out notices to the
Page 14
media of a Special
Event, with the image
Specials and Deals
of a red theater curtains and the words
Back Cover
“One More Thing” emblazoned on the
invite. All kinds of rumors began to fly as
to what would be revealed. In true Apple
fashion some things long rumored came to
pass and some surprises were shown.
Get Info is a publication of
iPod
the Grand Rapids Area
There had been a lot of talk regarding what
Microcomputer Users
Apple would do to differentiate the iPod
Group.
from the iPod nano. The biggest single
feature request was video support. Apple’s
official response had been
that no one would want to
watch a video on an iPod’s
screen and besides there was
no legal content to watch on
the iPod anyway. To many
that sounded like a “not now
but we’re working on it”
type of statement.
Those folks were proven
right when Apple introduced
the iPod with video, aka 5th
Generation iPod, on October
12th. The new models sport
a gorgeous 2.5 inch color
screen. They can display
album artwork and photos,
and play video including
music videos, video podcasts, home movies and television shows.
These new iPods come in
either 30GB or 60Gb storage
capacities. Which allows you to hold 15,000
songs-25,000 photos, or over 150 hours
of video. You can also choose between
one of two color chassis, white or black.
The 30GB model sports a 14 hour battery
life, for music playback, while the 60GB
model’s battery can play up to 20 hours of
music.(Max battery life for playing video is
3 hours.) You can also purchase a separate
video out cable to
Continued on Page 4
GRAMUG Meeting Highlights
by Monte
M
Ferguson
any folks think that user group meetings are for
computer wizards and geeks. That the conversation will
be way over their heads. While others have no idea what
such meetings have to offer. I have showcased several
recent gatherings below. As you can tell from these excerpts, a user group has something to offer nearly everyone no matter what their skill level.
April Meeting
April’s meeting was another lively one. We had a really
good turn out. In fact we had to find chairs for everyone.
(That’s a great “problem” to have in my opinion.) We
opened the meeting with questions and comments. With
Tiger being released the day after our meeting there were
a lot of questions regarding it. Several good points were
brought up. Then Duane offered a Treasurer’s report. The
group’s finances are in great shape. Membership is up by
over 11%. Terry shared the latest rumors and gossip. Then
we went to break.
After the break we got down to our main topic: Backing
Up Your Mac. The topic was inspired by an eBook from
the Take Control series. <http://www.tidbits.com/takecontrol/> I started out the presentation asking how many
people at the meeting backed up their system in one way
or another. The simple fact is not many people do back up
their Macs. (Attendees of our meeting being an exception
as most of them indicated they do back up their Mac.) So
when trouble happens their information is at risk.
Just as
important
as deciding to
back up
data is
coming
up with a
back up
plan. You
need to
figure out
which files
you need
to back
up, what
you are
going to
back them
up to, and
how often
do you
need
grand prize giveaway winNordquist, is shown with his to perform a
Our February
ner, Mr. Dave
prize. A 512mb iPod Shuffle.
back up.
Whatever
plan you
come up
with it
has to be
one that
you will
adhere to.
Because
you will
need
to back
up on a
regular
basis. Just
as there
are many
differOur March grand prize giveaway winent ways
ner, Mr. Paul Roese, is shown with his
to back
up your
prize, iWork.
information, there are just as many opinions on how you should
go about your back up. I passed out a couple of hand outs
that broke down some back up strategies in terms of cost,
ease of use, pros vs cons. It was a lively discussion to say
the least.
Giveaways
To conclude the meeting we had several items to giveaway. Julie Wolf won Toast Titanium 6. Stanley Ward won
Allume’s Stuffit Deluxe 8. Last, but not least, Robert xxx
won Blue Pixel Personal Photo Coach? from peach Pit.
May Meeting
Our May meeting was another full house. We had several
good topics brought up during the meeting’s Q&A session.
We discussed how to find the GRAMUG meeting dates
(via our web site, the forums and by subscribing to our
meeting calendar using iCal, Entourage or other iCalendar
compatible program.) Duane presented a treasurers report.
Our paid memberships on the rise, up to 37 members.
We had a lively discussion about MacOS X maintenance. Primarily the question was about letting certain
background housekeeping tasks that MacOS X needs to
do. These tasks usually occur in the wee morning hours if
the computer is left on. Folks wondered what to do, and if
it harmed anything, if they put their computer to sleep or
shut it off overnight. The consensus is that their are several
GRAMUG meets monthly, throughout the school year,
at CompUSA. Meetings are held on the Thursday of the
fourth full week. Meetings begin at 7pm.
You can also learn more about the group by going to our
web site: http://www.gramug.org/
2
Product Review:
Take Control eBooks
by Monte
Ferguson
within 30 days after a major MacOS release.)
ORMALLY WE REVIEW A PARTICULAR appliOne of the main problems with a printed book is it
cation or piece of hardware. But with this review
becomes obsolete so quickly. However the Take Control
we’re looking at not just a product but an idea.
books are updated free. The book prices are easy on the
This idea spawned a new look at publishing computer
wallet too, $5-10. You can even review a sample chapter,
related help books.
sort of try it before you buy it, at their web site <http://
The idea, like all good ones, is relatively simple. There
www.takecontrolbooks.com/>.
are people out there who want a tightly focused What you get:
And lastly, the publisher backs
A well written eBook, in PDF format.
title, that stays current, and does not cost
up their titles with a money
Chock full of tips and how to’s.
much. Better yet all of these titles are written
back guarantee.
Prices range from $5-15
by accomplished journalists. With the proceeds
System Requirements
from the sale going directly back to the folks
Cons
Any computer with a PDF viewer
who created the titles.
I really can’t find any fault
This type of project was not the brainchild of installed.
with these books. The main
a large publishing house. It was the collaboraproblem with most eBooks is
tive effort of a small group of professional writ- (Titles cover a wide variety of top- the publisher has put many
ics. You can view a full list of titles restrictions, such as not allowers. Now in it’s second year the Take Control
series has spawned a large assortment of titles. by going to <http://www.takecon- ing you to print the book, that
trolbooks.com/catalog.html>.)
What makes these books stand out is that
it is less useful than a printed
they are very focused. If you want a title just
book (in my honest opinion.)
on airport networking you can find it. You
Not so with the Take Control
won’t have to wade through a thousand pages
books.
just to find that one chapter on Airport networking. This
focus on narrowly focused topics results in easy to read
Conclusion
texts. They are quick to read through and are formatIf you’re looking for a well written technical book.
ted to be as good looking if you print them out, as they
Especially one that is not obsolete by the time you finish
look on screen. Since they are published in the Portable
reading it, give one of the Take Control titles a chance.
Document Format, aka PDF, you can use any PDF reader,
They’re inexpensive. A quick read. Yet full of useful inforsay Preview, to read them. Better yet you can search the
mation. It’s like having that friend who “really knows
entire eBook for the one item you’re looking for. The pubcomputers” on hand to answer your questions.
lisher has gone through great pains to make the books
easy to navigate by including bookmarks, and clickable
links. Better yet you get free updates, via Check for
o stretch a genetic analUpdates button, for the life of the title. (I.E. If the eBook in
ogy about species diversity:
question is about file sharing in Tiger you can receive free
you can visualize the Mac marupdates that cover all Tiger updates.) Another big advanket as a southern reef full of
tage is timing. By that I mean to say that these eBooks are
usually out months ahead of printed books.
brightly colored varieties and
N
“T
Pros
Frankly, I’ve usually been critical of the idea of eBooks.
The Take Control eBooks have shown that this format
can provide a unique and valuable service. This series of
books offers focused titles chock full of expert advice and
how to’s. You can download them immediately, no need to
drive anywhere or wait for the delivery truck. The titles
themselves are available in a very timely manner. (Easily
the Wintel market as an Arctic
deep populated almost entirely
by nearly invisible plankton and
”
a few whales.
Paul Murphy
LinuxInsider
3
Cover Story Continued connect your 5th generation iPod to your tv or entertainment system.
From Page 1
FileMaker 8 Adds Features, Retains
File Format
FileMaker, Inc. today took the wraps off
FileMaker 8, the latest version of its flagship desktop database product. Long-time
FileMaker users will be happy to learn
FileMaker 8 files are backward compatible
with FileMaker 7, the company’s recent
major overhaul of the venerable product
(see William Porter’s review in TidBITS721_). They may also be happy to see
FileMaker 8 offers built-in PDF and Excel
spreadsheet export capabilities, making it
simpler to exchange data with Excel and
other applications and product electronic
versions of documents with FileMaker data.
Other new features include auto-complete data entry, a visual spell-checker, a
built-in email mail merge feature for sending customized email messages, calendar
drop-downs for entering date information,
mouse wheel support, a visual graph of
database relationships,
and built-in tools for managing tabbed
panels within layouts. FileMaker Pro 8 is
available today for $300; FileMaker 6 and 7
users can upgrade for $180.
<http://www.filemaker.com/products/fmp/>
FileMaker Pro 8 also marks a change
for FileMaker Developer Edition, which has
been renamed FileMaker Pro 8 Advanced
to appeal to users who are sophisticated
enough to create their own database
solutions but who don’t necessarily see
themselves as developers. FileMaker Pro
8 Advanced enables database builders
to customize menus, as well as create
standalone applications and kiosks. New
features include flexible tool tips, an
enhanced script debugger which includes
a data viewer and can disable individual
script steps for testing, and an expanded
database design report providing an
overview of database and field setups.
FileMaker Pro 8 Advanced costs $500, and
FileMaker Developer 6 or 7 users can
upgrade for $300. Additional FileMaker 8
products - FileMaker Mobile 8, Server 8,
and Server Advanced 8 - should be available by the end of the year. [GD]
<http://www.filemaker.com/products/
fmpa/>
Continued on Page 5
All iPod models include earbud headphones, USB
2.0 cable, case, dock insert and a CD with iTunes for Mac and Windows computers. Both will begin shipping this week. Prices for the new iPods are: 30GB
model for US$299 and the 60GB model for US$399.
The one thing that is missing from these models is FireWire support. You
can no longer synch over FireWire. I’m sure this is due to the fact that most
iPods these days are sold to PC users. But it is a big disappointment to me.
FireWire is a superior way to get files into and out of the computer, ie faster.
Those folks who have computers that don’t have, and can not upgrade to, USB
2.0, older iMacs and iBooks, will find that they can only synch at the much
slower USB 1.1 rate.
These iPods are gorgeous to look at. They are so thin. They make my original iPod look like a brick.
It’s Cool But What About The Quality?
Watching your favorite video on your iPod has a certain appeal. What you
get for your money is a trade off in quality. Due to the limitations of people’s
internet connections, and no doubt concern of piracy by the movie studios, the
size and quality of the video you download from the ITMS is not DVD quality.
DVD quality video is formatted for 720x480. Video from the ITMS is formatted
at 320x240. However numbers don’t tell the whole story. I’ve seen video on the
iPod and it’s remarkably clear and shows little if any artifacts from compression. That’s thanks in large part to a new video compression standard called
H.264, part of the MPEG-4 standard. That quality even stands up reasonably
well when you hook up a tv to your iPod. Reports from folks who have done
so compare the video quality from the iPod to VHS tape quality. Not excellent
but certainly nothing to sneeze at either. Be prepared to download for a bit.
Apple estimates that each 1 hour video is the equivalent of 5 music albums.
(Approximately 200 MB.)
I was initially not impressed with the idea of watching video on the iPod.
But I have to admit that having seen one close up I have completely changed
my tune. And you don’t have to watch all of the video on the iPod’s screen.
You can hook up cables to connect the iPod to your TV so you can view it on a
larger screen.
iTunes 6
Of course Apple wants to give all of those new iPod owners a place to pur-
Continued on Page 6
4
Reality and Digital Pictures
by Charles
Continued
Security Update 2005-007 v1.1 Works
with 64-Bit Apps
Apple has released version 1.1 of its Security
Update 2005-007 for Tiger users. The only
change in v1.1 is that it provides a combined 32and 64-bit version of the operating system component LibSystem; the initial release of Security
Update 2005-007 omitted the 64- bit version,
breaking 64-bit-savvy programs like Mathematica
on systems with G5 processors.
<http://docs.info.apple.com/article.
html?artnum=302163>
The 64-bit change for Security Update
2005-007 applies only to the client and server
versions of Mac OS X 10.4.2 Tiger - folks using
Mac OS X 10.3.9 Panther don’t need to worry
about downloading a new version of the update.
Apple is recommending that all Tiger users install
the new version of the update, although -in
theory - users of G4-based machines have nothing to gain if they’ve already installed the first
version of the security update. (Except, perhaps,
to prevent Software Update from nagging them
about it.) The update sizes remain unchanged:
approximately 18.5 MB for the client version of
Mac OS X 10.4.2, and 20.6 MB for the server
version. [GD]
<http://www.apple.com/support/downloads/
securityupdate2005007v11macosx1042client.
html>
Apple Creates Rev-1 iMac G5 Repair
Program
Four months after my iMac G5 went “Up In
Smoke” (see TidBITS-777_), along with those of
untold numbers of other users, Apple has finally
admitted publicly that there’s a problem, instituting an official repair program for revision-1 iMac
G5s. According to Apple, symptoms eligible for
free repair include scrambled, distorted, or missing video (caused, I believe, by blown capacitors
on the midplane) or no power (the problem I
had - there is, of course, no mention on Apple’s
page of smoke and an evil smell emanating from
the computer). Apple lists the range of serial
numbers of affected machines. These are all revision-1 17-inch and 20-inc iMac G5s; the revision2 faster machines released starting in May 2005
are apparently unaffected.
<http://www.apple.com/support/imac/repairextensionprogram/>
Continued on Page 6
P
Maurer
EOPLE OFTEN ASK ME IF I
think digital photography is
as good as film or will ever
become as good as film. I reply that
for all but a few special purposes,
digital is better already. Technically,
my digital photographs are at least
as good as the best conventional
photographs I ever took with 21/4” x 3-1/4” (6 cm x 9 cm) film,
and pictorially they are better.
With my digital camera I can take
pictures in the street that used to
require a studio.
In this article I shall explain
what digital technology can do
that conventional photography
cannot - how computers can produce more naturalistic pictures,
not how they can produce special
effects. To do this I’m going to start
with perception, pass through art,
and enter computers by the back
door. Although this is an unusual
route, it approximates the way I
think when taking a photograph
and it provides the only way I
know for negotiating the maze of
manipulations offered by photo
editors. Although I shall mention some specific products (all of
them available for the Mac as well
as Windows), I shall not describe
any in depth. The difficult part
of digital photography is figuring out what must be done in the
computer and which application
can do it. Knowing that, it is rarely
difficult to figure out how to make
the application do its job.
This article is illustrated with
a number of pictures. To see them
appropriately, your monitor ought
to be in rough calibration. If you
have never calibrated your monitor, I suggest that you do it now. It
takes about two minutes. Open the
Displays preference pane, click the
Color tab, click Calibrate to launch
the Display Calibrator Assistant,
select the Expert Mode checkbox,
and then follow the instructions.
When you come to the screen asking you to set the gamma, select
2.2.
For one reason that will become
clear, I find some version of
Photoshop to be necessary. For this
reason I shall assume its use as a
photo editor, although you need
not own it to understand the article. Along the way I shall mention
the differences among the last three
versions (CS, CS2 and Elements)
that matter for my approach.
Eye vs. Camera
To begin with, let’s dispel the
notion that a camera records what
the eye can see. It does not and it
cannot because a camera functions
nothing like the eye. With a lens of
normal focal length, a camera
records an image with a diameter
of approximately 45 degrees. It
records the entire image at once
and the image ends up as a print
with a range of intensity from
black to white of approximately
one hundred to one. In contrast,
the eye sees an area about 180
degrees across but it sees most of
this with acuity that ranges from
bad to dreadful. It sees sharply just
in the central 1 to 3 degrees. To see
a scene clearly, the eye must scan
it and the brain must assemble
the accumulated information.
However, the eye rarely has time
to sample more than small portions
of a scene with its spot of clear
vision so most of what you see has
no optical source, it is an inference. Your brain infers information
largely by generalizing from what
it has encountered before. In doing
this the eye and brain have to handle contrasts of light that exceed
one million to one.
In short, when you look at a
snapshot you took at the beach, the
limitations of the camera mean
that three-quarters of the scene
will have been lopped off, the
range of tones will be compressed
tenthousandfold, and the information that remains will never be
what you saw. Any appearance
of realism will be an inference
Continued on Page 17
5
Cover Story Cont’d chase some
content .
from Page 4
Continued
The good news is that Apple will repair
affected machines for free, even if they are
no longer under warranty. The initial program
is for two years from the date of purchase,
but Apple may extend this at its option.
The bad news is that in order to qualify, it
appears that you must place your machine
physically before the eyeballs of an Apple
representative or service provider. It will
be interesting to learn whether this means
that repairs like mine, where Apple simply
shipped the needed parts directly to my
home, will no longer be available. [MAN]
Apple Releases Security Update 2005007
Apple Computer today released Security
Update 2005-007 for both client and server
versions of Mac OS X 10.3.9 Panther and
Mac OS X 10.4.2 Tiger. The update includes a
number of patches to Apple software (such
as Mail, Safari, under-the-hood technologies
like the Quartz and CoreFoundation frameworks, and, in Mac OS X Server 10.4.2, the
Server Admin tool used to create firewall
policies). Apple also
patched components of Mac OS X’s Unix
underpinnings, including OpenSSL, the
X11 windowing system, Apache 2, CUPS,
Kerberos, and zlib. Apple recommends all
Mac users install this update since it addresses several security problems which could, in
theory, enable a remote attacker to access
data on the computer, create user accounts,
execute arbitrary programs, or let URLs
bypass Mac OS X’s built-in security check
when clicked. The update is
available from Apple via Software Update
and at the first URL below; the download
ranges from 13.3 MB to 29.9 MB, depending which version of Mac OS X you need to
update. Apple details the changes included
in Security Update 2005-007 at the second
URL below. [GD]
<http://docs.info.apple.com/article.
html?artnum=61798>
Continued on Page 7
That’s where
the next product announcement
comes in. The iTunes 6 release comes
almost on the heels of the last major
release. So what makes this update
deserve a full version number?
Video.
Complimenting it’s iPod with
video, Apple announced that the
iTunes Music Store would now also
feature over 2,000 music videos, and
six short films from Pixar Animation
Studios. But that’s not all. Apple
teamed up with Disney to offer current and past episodes of hit ABC tv
shows ‘Desperate Housewives’ and
‘Lost’, as well as episodes of a new
drama ‘Night Stalker’ and two of
the Disney Channel’s most popular
shows ‘That’s So Raven’ and ‘The
Suite Life of Zack & Cody’. The videos cost $1.99 per episode. You’ll be
able to buy current episodes the day
after they’ve been shown on national
tv.
Other New Features
There are always those features that
do not get much attention but they
come in handy. Such is the case with:
Expanded online gift options, which
allow the customer to give specific
songs, albums, music videos or their
own iTunes playlists to anyone with
an email address; “Just for You” personalized music recommendations
and online customer reviews.
October Announcements
Part II
Apple let the iPod buzz settle down
a bit before announcing their next
round of product announcements.
This time the focus was on hardware.
iMac
These days a lot of the attention
focused on Apple is due to the iPod.
But Apple is still putting out great
computers. In October Apple updated it’s flagship consumer model,
the iMac. Jobs dubbed the previous
iMac G5 ss
version 3.0.
This new
version
builds on
the success
of the previous iteration. It’s
slimmer
than the
previous
version by
a 1/2 inch.
They’re
also 15 percent lighter
than previously.
It sports
slightly
faster processors, 1.9
or 2.1Ghz.
They all
come with 8X SuperDrives with
Dual Layer support. You also get
a much beefier video card built in.
Either an ATI X600 Pro or XT with
128mb DDR memory using the new
PCI Express for faster performance.
Both models come with 512mb of
memory, expandable to 2.5Gb. The
entry level model sports a 160GB
hard drive while the higher end has
a 250GB unit, expandable to 500GB.
Airport Extreme and Bluetooth
is included. Also included is
Continued on Page 13
6
For Your Eyes Only: Virtual
Private Networks
Continued
PowerBook Graphics Update Solves
Narrow Issue
Last week, Apple released PowerBook G4
Graphics Update 1.0, a 2.1 MB patch that
improves graphic stability for some 15-inch and
17-inch PowerBook G4 models running the 1.67
GHz PowerPC processor;
apparently the installer performs a hardware
check to determine if the update is required. The
update requires Mac OS X 10.4.2. [JLC]
<http://www.apple.com/support/downloads/powe
rbookg4graphicsupdate10.html>
SaveScreenie Switches File Formats
A few weeks back, I mentioned that you could
enter a particular command into Terminal to
change the format Mac OS X 10.4 Tiger uses
for screen captures made with CommandShift-3 and Command-Shift-4 (see “How to
Change Screen Capture Formats” in TidBITS785_). Needless to say, it’s not hard to copy
and paste such a command, but it’s about as
elegant as a waltzing kangaroo, so Christian
Franz of cf/x decided to embed the functionality into a small utility as a way of getting to
know Apple’s Xcode better. The result is the
free SaveScreenie 1.2, which presents you
with a few radio buttons corresponding to
the available formats (PNG, PDF, JPG, TIFF, BMP,
PSD, and PICT); select one, click the Set button, and log out or restart your Mac to have
it change the screen capture format. After
Christian showed me the initial version, I made a
few wording suggestions (once an editor, always
an editor) and recommended that he include a
Web page link for each format that would tell
the user more about that format. He whipped
up a new version with my changes, and if you’ve
been wanting to fiddle with your screen capture formats, SaveScreenie is now ready to help.
[ACE]
<http://www.imovieplugins.com/
other%20products/savescreenie.html>
iTMS Opens in Japan, Rolls Some Stones
Apple Computer got some satisfaction for its
iTunes Music Store, announcing not only
the debut of the Japanese version of iTMS but
also the worldwide availability of early Abkco
catalog recordings, which includes early rock ‘n
Continued on Page 8
by Kevin
R
van Haaren
ECENT ARTICLES IN
TIDBITS and discussions in
TidBITS Talk have mentioned
virtual private network (VPN) technologies. VPNs are usually brought
up as a tool for securing communications across insecure networks.
Glenn Fleishman used a VPN to hide
all his network traffic while connected to public wireless hotspots during
the South by Southwest Interactive
conference, and I mentioned VPN
technology in TidBITS Talk as a way
to enable Apple’s Remote Desktop to
control computers behind a firewall.
But what exactly is a VPN? This
article is intended to explain some of
the concepts and terminology behind
VPN.
A VPN is a way of securely
connecting computers across insecure networks such as the Internet.
Although this might sound straightforward, building a secure network
involves several subtleties beyond
simple encryption. Security requires
authentication - each communicator
must prove its identity to the other
end. Even the encryption component can be difficult - how do you
exchange encryption keys on a network that’s insecure?
Why VPN?
Why would you want a virtual private network? Most people use them
to connect with corporate networks
while traveling or working at home,
but they have other uses as well. The
primary reason I installed a VPN
was so I could travel with my laptop,
but still access home resources like
my iTunes library and email server,
resources that are normally protected
from other computers on the Internet
by a firewall. I also used it at home
initially to protect wireless connections that were “secured” by the easily breakable WEP. When I upgraded
to an AirPort Express and a Mac
mini using the far-more-secure WPA
security instead of WEP, I decided to
keep using my VPN as a paranoid
defense against the possibility that
someone figures out how to break
WPA. A VPN can also provide a
secure connection for programs such
as Apple’s Remote Desktop 2, which
has weak security on its own.
Do you perform tech support
for your extended family, or for
home users at a business? Ever run
into problems trying to help them
remotely because they are behind
a firewall? Upgrading to a firewall
that provides a VPN can solve this
situation by bypassing all the firewall rules, letting you connect and
troubleshoot problems remotely.
Firewalls for Security
Broadband users are often wisely
advised to install a DSL or cable
router with a built-in firewall to protect their home networks, and most
use Network Address Translation
(NAT) to share the single public IP
address that their Internet service
provider allocates among several
computers. The firewalls in these
low-cost routers are usually enabled
by default. Or, if you only have one
computer, you can activate the firewall built into Mac OS X with the
click of a button in the Sharing preference pane.
Firewalls restrict access from the
Internet to the local network. If my
father has a firewall protecting his
home network and I want to provide
tech support for him, I can’t just
fire up Apple Remote Desktop or a
VNC (virtual network computing)
program and connect to his computer. There are two reasons for this
problem: first, to which IP address
do I connect? The public IP address
is just the address for the router, not
for his computer. Even if he can tell
me the IP address that appears in his
Network preference pane, that IP is a
private address assigned by his NAT
firewall and not directly accessible
from the Internet.
Continued on Page 8
7
Virtual Private Network Cont’d based on the port number. If you
need to use the same application
from Page 7
Continued
roll classics from The Animals, Sam Cooke, Herman’s
Hermits, Marianne Faithful, and the Rolling Stones.
The iTunes
Music Store is now the only online music service
with the complete catalog of the Rolling Stones.
<http://www.apple.com/pr/library/2005/aug/04itms.
html>
The Japanese version of the iTunes Music Store
reportedly features more than 1 million tracks,
including songs from popular Japanese acts such as
Little Creatures, Chara, and Crazy Ken Band, alongside Japanese radio shows and podcasts. Over a
dozen Japanese companies are providing music for
the Japanese version of iTMS, along with international distributors, and Apple plans to offer more
Japanese content in the months ahead. Songs on
the Japanese version of iTMS sell for 150 or 200
yen (roughly US$1.35 / $1.80). Apple announced
this week that the new store sold more than 1 million songs in its first four days of operation. Apple
hopes the introduction of the Japanese version of
iTMS will spur sales of iPod music players, particularly the iPod shuffle. Unlike the rest of the world
- where the iPod is the utterly dominant portable
music player - it merely leads the pack in Japan,
accounting for about 36 percent of the market
while rival Sony has managed to secure about 27
percent of the market for flash-based music players.
[GD]
<http://www.apple.com/pr/library/2005/aug/08itms.
html>
HP Dropping the iPod
Only one month after adding the iPod shuffle to its
product lineup, Hewlett-Packard reportedly plans
to stop reselling Apple’s iPod digital music players by the end of September 2005. The reselling
arrangement between Apple and HP was launched
in January 2004 to much fanfare and, at the time,
seemed like a good way for Apple to get the notyet utterly iconic
digital music player into new retail and marketing
channels. But that’s not quite how things worked
out: HP apparently never made much money selling iPods, and its versions often fell behind Apple’s
product offerings and were sold as discounted
also-rans. HP’s portion of the iPod phenomenon
reportedly amounted to less than 5 percent of iPod
units sold. And HP has bigger problems to solve: it’s
currently in the process of jettisoning about 10 pe
Continued on Page 9
The second reason is that most
firewalls employ a “speak only
when spoken to” philosophy.
Examples of this idea in action
include the Web and the iTunes
Music Store: I can view pages
from a Web server, but not until
my browser makes the initial connection to the server; similarly,
the iTunes Music Store can display within iTunes, but only after
my computer has sent it a request
to send me the info. To extend the
analogy, the request for a remote
control connection would have to
come from the remote computer
first to get through the firewall,
and since the remote computer
won’t necessary have a person
in front of it, it’s hard to generate that initial request. (See
Chris Pepper’s article, “What’s
a Firewall, and Why Should You
Care?” in TidBITS-468_, for more
detailed information on firewalls.)
Open the Ports
One frequently recommended
solution to getting through a firewall is to open the port (or ports)
an application uses to communicate. Network applications talk
using ports. Stealing an analogy
from Chris’s firewall article, ports
are like apartment numbers in
regular mail addresses. If you
send a letter to a friend in an
apartment building, the building
address is not enough: an apartment number is needed to get
the letter to the right apartment.
Similarly, a computer’s IP address
is not enough to get network data
to the correct application. The
port number is used to direct the
data to the correct program such
as the Web or mail server. Most
popular Internet services have a
default “well known” port number.
<http://www.iana.org/assignments/port-numbers>
NAT-based firewalls can redirect incoming traffic to a specific
computer on the internal network
to connect to multiple computers
on the internal network there are
two options available: configure
the firewall to listen on additional
non-standard ports and redirect
those ports to the standard port
on the destination computer (not
all firewalls support this capability), or connect to one of the
internal computers, then use that
computer to access the other computers on the network.
With simple firewalls, opening
a port opens it to everyone on the
Internet. More complex firewalls
can limit access to a port based on
things such as source IP address
and time of day.
Mac OS X has a full-featured
firewall built-in, but Apple’s
preference pane limits your
options to the simplest configurations - opening a port opens it to
everyone on the Internet. Third
party tools such as Brian Hill’s
BrickHouse can provide GUI
access to a much broader range
of functionality, or you can use
even more full-featured tools
like DoorStop X from Open Door
Networks or IPNetSentry from
Sustainable Softworks.
<http://personalpages.tds.net/
~brian_hill/brickhouse.html>
<http://www.opendoor.com/
doorstop/>
<http://www.sustworks.com/
site/prod_ipns_overview.html>
Even with the more advanced
configuration options that
BrickHouse or your cable or
DSL router offers, building these
exceptions can be time consuming and error prone (IPNetSentry
takes a different approach for this
reason, looking for suspicious
activity and, when triggered, banning the intruder). Some simple
facts of Internet use can make
maintaining these rules difficult.
For example, adjusting access for
someone with an ever-changing
dynamic IP address can be frustrating, or even impossible if you
are trying to make the change
from a dynamic address not
Continued on Page 10
8
Cleaning House in iTunes
Continued
cent of its workforce in order to make its bottom
line roughly $2 billion fatter. [GD]
<http://www.apple.com/pr/library/2004/jan/08hp.
html>
iPhoto 5.0.4 Flips Photos Properly
Apple has released iPhoto 5.0.4, a minor update
that “addresses an issue with browsing photos that
have been auto-rotated by a camera.” Honestly, I’ve
not seen the problem (it seems to relate to editing photos that were auto-rotated by your camera
and that appear in the wrong orientation), but
the speed with which 5.0.4 followed 5.0.3 means
that it’s probably bugging a bunch of people. The
update is roughly 40 MB via Software Update or
as a standalone download. [ACE]
<http://www.apple.com/support/downloads/
iphoto504update.html>
Simon 2 Says: Monitor Your Server
Dejal Software has released Simon 2, a major
update to their server monitoring utility. Simon
performs repetitive checks on a remote Internet
service and reports back if the test fails and, if
so, when the service comes back online. Simon
can also watch Web pages for changes. The most
important new feature is a Port service that provides the capability to check virtually any server
type; that’s key for keeping tabs on POP, IMAP,
SMTP, AFP, DHCP, and
other servers that weren’t previous supported.
Simon can notify you of problems with a variety
of local actions, via email (which can enable text
messages to cell phones), by launching an application (which extends Simon’s reach even further),
by playing a sound, or by speaking pre-defined text.
Simon 2 also features a more flexible interface that
better lends itself to the creation and maintenance
of many tests and multiple notifiers. Simon 2 costs
$30 (Basic License: 7 tests), $60 (Standard License:
20 tests), or $200 (Enterprise: unlimited number of
tests). It’s a 3.4 MB download. [ACE]
<http://www.dejal.com/simon/>
OmniWeb 5.1.1 Released
The Omni Group has released OmniWeb
5.1.1 to fix a variety of minor bugs and improve
compatibility with Mac OS X 10.4 Tiger. You can
read the full change list on the OmniWeb Release
Notes page linked below; suffice to say that if you
use OmniWeb, particularly with Tiger, you’ll want
to download the 6 MB update to eliminate some
Continued on Page 10
by
Adam C. Engst
L
EAVING ASIDE ALL THE
legal and ethical considerations of downloading unauthorized music from the Internet, one
of the things that’s always bothered me is the horrible metadata
that most shared tracks seem to
have. It’s entirely common to end
up with files with barely descriptive names and completely blank
ID3 tags for the artist and album.
I hate that. I also dislike the
duplicates that can results from
accidentally importing tracks
multiple times, which is all too
easy with multiple people sharing the same library, as Tonya and
I do. Call me a neat freak, but I
can’t stand a messy database, and
the iTunes Library is essentially a
database of track information.
It was time to clean house.
Clearing Duplicates
I started with a new feature in
iTunes 4.7: the Show Duplicate
Songs command in the Edit
menu. It’s a little brain-dead,
in that it appears to match only
on track name, but it’s better
than nothing. iTunes identified
over 200 duplicate songs, most
of which were legitimate duplicates stemming from greatest hits
albums, covers by other artists,
or poor song names. Ideally, the
Show Duplicate Songs feature
would evolve to give the user
additional control, so I could, for
instance see only songs with the
same name, artist, and album,
and only then if they were the
same length. Nonetheless, it was
useful for clearing out a few complete duplicates.
Identifying Unknowns
After removing the duplicates, I
was still left with 121 tracks that
had incomplete metadata and
thus offended my sense of order.
Some were authorized tracks
I’d downloaded from artist Web
sites, others were tracks I’d downloaded because I own the record
albums, a few were samples from
various venues, and a number
were entirely unidentifiable (even
when I listened to them).
I didn’t want to put the effort
into listening to each track with
incomplete metadata and manually updating the tags. Instead,
I downloaded Jay Tuley’s free
iEatBrainz utility (1 MB download), which attempts to match
the musical fingerprint of a
track in iTunes with one in the
MusicBrainz database, a Webbased database of fingerprints
and metadata for over 2.5 million
songs. It’s a clever idea and I was
curious about how well it would
work.
<http://www.indyjt.
com/software/
?show=ieatbrainz#ieatbrainz>
<http://www.musicbrainz.org/>
I selected the 121 tracks in
my library that lacked artist or
album tags, and then I fed them
to iEatBrainz to see if it could find
a match. It wasn’t exactly speedy,
and its fingerprint matching algorithm wasn’t terribly accurate, but
in the end, iEatBrainz managed to
present me with what seemed like
correct metadata for 54 of the 121
tracks. Many of the rest it couldn’t
find at all, and for some it
guessed completely wrong. But
hey, 54 out of 121 is way better
than nothing.
Filling in the Blanks
I was still left with a nagging
feeling that the metadata in my
iTunes Library wasn’t as complete
as it could be. iTunes ships with
a sample smart playlist called
“60’s Music” that looks for tracks
whose year is between 1960 and
1969. But although I have a lot
of music from the Beatles,
Continued on Page 11
9
Virtual Private Network Cont’d
from Page 8
Continued
annoying page drawing problems on
certain sites and crashes in specific
situations. Despite Safari’s new features in Tiger, I still find myself relying
on OmniWeb for most of my Web
browsing thanks to features like
reopening pages on relaunch, workspaces, separate window editing of
textarea fields, find/replace in textarea
fields, and more. [ACE]
<http://www.omnigroup.com/applications/omniweb/releasenotes/>
Apple Discloses, Limits .Mac
Bandwidth Transfers
Apple’s ..Mac service has played it
coy for years about how much bandwidth transfer (bytes to and from
your Web pages and other parts of
your account) are included with your
annual $100 fee. I’ve asked Apple
directly about it before and some
folks have tested it, and it appears to
be... well, it varies based on velocity of
downloads, kind of material, etc.
No more. Now the bandwidth limits
are officially 3 GB per month with
a regular subscription and 9 GB a
month if you pay the extra $50 per
year for a full 1 GB of online storage.
[GF]
<http://news.yahoo.com/
news?tmpl=story&u=/mc/20050720/
tc_mc/
macaddshigherbandwidthoption>
<http://mac.com/>
DoorStop X 1.0 Enhances Mac
OS X’s Firewall
Back in 1998, Open Door Networks
shipped DoorStop, the first firewall
for the Mac. The program was subsequently licensed to Symantec for
Norton Personal Firewall, and now
Open Door has released DoorStop
X, a new version for Mac OS X 10.3
Panther and 10.4 Tiger. Although Mac
OS X has had a built-in firewall since
Mac OS X 10.2 Jaguar, and the version in Tiger finally offers rudimentary
logging of denied access attempts,
Continued on Page 11
already configured in the firewall rules.
Another issue that opening firewall
ports cannot solve is unencrypted data
streams. Anybody on the network path
between the source and destination can
use simple tools to extract the traffic.
If you use VNC software for remote
control, others on the Internet can view
exactly what you are seeing/typing.
VNC does encrypt the initial authentication made to a remote computer, but
if you use it to change a password or
unlock a remote screen saver, the password is sent unencrypted. Both FTP
and telnet also send your password as
plain text.
The ideal solution is to make your
local computer connect over the
Internet, through the remote firewall,
bypassing all the rules, to any number
of computers or devices behind the
firewall. Additionally we want to keep
those communications secret from prying eyes, and we want to ensure the
connecting computer is really the one it
is claiming to be.
Virtual private networks were
designed to provide this solution by
creating a secure tunnel through which
all traffic flows from you - wherever
you may be on the Internet - to your
network. Several types of VPN are
available: a group of open protocols
referred to as IPsec; Point-to-Point
Tunneling Protocol (PPTP); Layer 2
Tunneling Protocol (L2TP), frequently
used with IPsec; SSH tunnels; and SSL
VPN.
<http://www.freebsd.org/doc/en_
US.ISO8859-1/books/handbook/ipsec.
html>
IPsec
Originally, IPsec was used on corporate
enterprise networks as a way to connect
remote offices over cheaper Internet
connections instead of more expensive
dedicated lines. Large dedicated VPN
firewalls would be placed in each office
and connected together. Fortunately,
the costs of implementing these systems has dropped considerably over
the years, with many inexpensive home
routers including VPN capabilities for
only a slightly increased cost.
IPsec uses a two-phase system to
establish the VPN. In phase one
the identity of each participant is
authenticated. Phase two is the actual
exchange of encrypted data. Each phase
negotiates the various methods to be
used for authentication and encryption
key exchange. To increase the security
of the tunnel the two phases re-negotiate, re-authenticate, and exchange new
encryption keys at periodic intervals.
PPTP & L2TP
PPTP is an older and less secure VPN
technology developed by Microsoft.
PPTP is still quite popular (especially
in Europe) because it is built into
Windows. L2TP is a combination of
Microsoft’s PPTP and Cisco’s L2F
(Layer Two Forwarding) technology.
L2TP over IPsec encapsulates the L2TP
traffic in IPsec packets. The use of IPsec
allows the authentication phase of the
VPN to be encrypted, something PPTP
does not support otherwise. Mac OS
X supports both PPTP and L2TP over
IPsec, both configured via Apple’s
Internet Connect application.
SSH
SSH tunnels are a popular method of
encrypting and authenticating communications between computers. An SSH
tunnel uses a port forwarding model
where ssh on the client side gathers all
data packets sent to a particular port
and sends them through an encrypted
tunnel. The server on the far end (running sshd) decrypts the packets and
forwards them to the appropriate destination.
Unfortunately, an SSH tunnel is
a computer-to-computer system. If I
want to use SSH to multiple computers
behind a NAT firewall, I must either
open additional ports on the firewall,
one for each system, or tunnel to one
machine, then connect from that computer to other machines. Both methods
can be complex to set up. An additional
limitation of SSH tunnels is that they
support only TCP connections, and
not UDP. As a result, ssh tunneling is
insufficient for applications like Apple
Remote Desktop.
SSL VPN
SSL VPNs are the current hot items in
networking. An SSL VPN uses
Continued on Page 12
10
Cleaning House in iTunes Cont’d
from Page 9
Continued
DoorStop X provides far better logging (particularly in concert with Open
Door’s Who’s There? Firewall Advisor
utility) of both allowed and denied
access attempts.
DoorStop also features a more graphical interface that makes it easier to
understand your configuration at a
glance, and most important, the program
enables you to open up a particular
port to a specific IP address or range of
IP addresses, thus eliminating the all-ornothing approach of Mac OS X’s built-in
firewall. Through 15-Aug-05, DoorStop
X costs $40, or $60 when bundled with
Who’s There. Educational discounts are
available for multiple license packs. A fully
functional trial version (2.2. MB download) works for 30 days; Who’s There
has a fully functional, 10-day trial version
(also 2.2. MB). [ACE]
<http://www.opendoor.com/doorstop/>
<http://www.opendoor.com/whosthere/>
Yahoo Gets With a New Konfab
Yahoo announced today that it has
purchased Konfabulator, an application
(for both Mac OS X and Windows)
which enables users to run small custom
applications - called Widgets - right on
their desktop. (In case you’re wondering,
Konfabulator came substantially earlier
than Apple’s Dashboard and its widgets:
see Adam’s review back in TidBITS-717_.)
Konfabulator has inspired an enthusiastic
developer community that created widgets to report on everything from traffic
and mosquito conditions to metronomes
and add-ons for Apple’s iChat and iTunes.
But not only is Yahoo buying Konfabulator,
it’s giving the program away for free!
Anyone who purchased Konfabulator in
the last two months will receive a refund.
Yahoo sees Konfabulator as a core
technology behind the Yahoo Developer
Network: Konfabulator - likely to be
renamed Yahoo Widgets - will be a
means by which Yahoo promotes its new
XML-based content distribution schemes.
By making Konfabulator free, Yahoo
hopes developers will create Widgets for
Continued on Page 16
Doors,
and Simon & Garfunkel, that smart
playlist contained only 41 tracks. For
whatever reason, when I’d ripped
my CDs years ago, the CDDB didn’t
give me the year information. And, of
course, I was lacking artwork for most
of my albums, the ripping of which
predated the appearance of that feature in iTunes.
I’d come across LairWare’s $20
MPFreaker, and decided to give it a
spin. MPFreaker promises to fill in
the blanks in your iTunes metadata,
downloading better information from
online databases. MPFreaker can fix
nearly everything related to a song,
including title, album, artwork, genre,
year, and track number. You can feed
MPFreaker a few songs manually,
point it at a playlist, or give it your
entire iTunes Library. I was unsure of
what it would do, so I started with
a few songs, tested a small playlist,
and then I finally bit the bullet and
ran it against my library. In each case,
MPFreaker worked fine, although I
was careful not to check the Overwrite
checkbox for each of the pieces of
metadata that MPFreaker can update,
figuring that any data I already had
was fine.
<http://www.lairware.com/mpfreaker/>
MPFreaker performed wonders,
adding year and artwork information
to many - though not all - of my
songs. It wasn’t particularly fast, but
considering I had handed it 4,100
songs to check, I was neither surprised nor bothered. One slight oddity did present itself; after the first
run, my 60’s Music smart playlist had
grown to over 200 songs. But when I
created another smart playlist to see
how many tracks still lacked year
information, there were nearly 900.
A second run of MPFreaker picked
up year information for a number of
additional songs; I’m not entirely sure
why.
As long as you’re careful not to
overwrite data mistakenly, and you
don’t mind the occasional low-resolution artwork, MPFreaker is a fabulous
utility for cleaning, regularizing, and
filling in the blanks in your iTunes
Library. You can try the demo on three
songs per launch; otherwise it’s a 2.4
MB download.
Now, if you don’t mind, I need to go
listen to my database.
This article orginally appeared in
Tidbits Magazine issue #768, published 2/28/05. It is reprinted with
the permission of the Author.
“There are varied
opinions among the
financial analysts as to
whether Apple will ever
return to its former
glory of the 1980s (yes
it was that long a time
ago). The most recent
evidence suggests that
it has already done so,
and I welcome it. The
IT industry and the PC
industry, in particular,
needs Apple to succeed.
”
Robin Bloor
IT-Analysis
the Register
11
Virtual Private Network Cont’d
from Page 10
standard Web protocols for authentication and encryption. This approach
enables the VPN to work through
restrictive firewalls that block the
ports of other VPN protocols. SSL
VPN technology offers a range of
capabilities. At its simplest, the VPN
may be a reverse Web proxy, providing authenticated Internet users access
to intranet Web servers behind the
remote firewall.
SSL VPNs can also provide Webbased file browsers that enable users
to access Windows and NFS file
shares on the remote network. No
special client is needed for this, as the
VPN hardware handles the translation
from network shares to Web pages.
More advanced SSL VPN units
offer functionality similar to SSH tunnels. The user logs in to a Web application and launches a Java or ActiveX
client that configures all port forwarding options. In this configuration, just
ports needed for an application are
tunneled, so the chance of infection
from viruses and Trojans is greatly
reduced. This limited access enables
many corporations to use an SSL VPN
to provide network access to untrusted computers, such as employees’
home computers and vendor systems
for supporting internal applications.
Additionally, many handhelds with
wireless networking and Java support
can tunnel in via an SSL VPN too.
High-end SSL VPN products
offer a complete TCP/IP stack that
encrypts packets across an SSL link,
an approach called “IPsec replacement” mode because it provides the
security of a full IPsec VPN while still
being able to work through restrictive
firewalls.
<http://www.nwfusion.com/
reviews/2004/0112revmain.html>
SSL VPNs are popular in enterprise networks, but the current highcost of entry keeps them out of the
reach of most home and small business users. Because of their flexibility
and low cost, I focus on IPsec VPNs
for the remainder of this article.
VPN to What?
Once you select a VPN protocol, you
need to decide the type of connection
you want to make: computer-to-computer, computer-to-network, or network-to-network. The computer-tocomputer connection enables access
only to the individual remote computer. Computer-to-network enables one
computer access to all devices on a
remote network. And a network-tonetwork connection enables entire
offices of computers to communicate,
without the need to configure each
machine. Most people are interested
in connecting a laptop or small home
office machine to a remote network
(computer-to-network), so I focus on
this scenario.
First, you need to pick a VPN
client. Mac OS X includes an IPsec
implementation based on Racoon
from the KAME Project. As with
many Unix applications, you configure the software via a text-based
config file. “Simple” configuration
examples are available online.
<http://www.kame.net/racoon/>
After examining the available
documentation, I decided there must
be a better way. Fortunately I was not
the only one with this idea. A quick
Internet search turned up several
graphical configuration tools. VPN
Tracker ($90 for a personal license,
$200 for a professional license) from
Equinux, and IPSecuritas (free) from
Lobotomo are two of the most popular.
<http://www.equinux.com/us/products/vpntracker/>
Additionally, many VPN firewall
makers have produced Mac OS X versions of their client software. Check
Point and Cisco both offer Mac OS
X clients for their VPN products. Be
sure to check the supported configurations and versions of the software.
Cisco only recently added support for
dual-processor Macs and Mac OS X
10.4 Tiger, although there are reports
it doesn’t completely work even with
10.4.2. MacInTouch has a lengthy list
of reader reports on the Cisco VPN
client.
<http://www.checkpoint.com/
press/2004/mac120704.html>
Next, to connect your Mac to an
entire network via VPN, your network needs a VPN router. Mac OS
X 10.4 Tiger Server has many nice
VPN configuration options builtin. Academic versions of Mac OS X
Server are typically available starting
at $250; retail is $500 or $1,000. If you
have not yet upgraded, going from
Jaguar to Tiger Server is about $370
more than going to non-Server Tiger
(non-academic).
In theory, a Mac running the client
version of Mac OS X should be able
to act as a VPN router too, but most
of the documentation I’ve found is
for Mac OS X Server. Instructions for
setting up a FreeBSD box as a VPN
router are available, and they may
translate over to Mac OS X.
<http://www.lugbe.ch/lostfound/
contrib/freebsd_router/>
I don’t have a spare Mac capable
of running Mac OS X lying around, so
I began looking for a small dedicated
VPN router. Most manufacturers of
broadband routers offer VPN versions
of their products for $10 to $20 more
than the non-VPN versions (see below
for links to a number of common
devices). When looking for a VPN
router, watch out for products labeled
“IPsec Pass-Thru” - these are not what
you want. IPsec Pass-Thru enables a
VPN connection to work through the
device, but does not mean the router
can act as a VPN endpoint. The specifications for a true VPN router should
list the number of VPN tunnels the
device supports.
<http://www.dlink.com/products/
?sec=0&pid=274>
<http://www.netgear.com/products/
details/FVM318.php>
<http://www.linksys.com/servlet/Sa
tellite?childpagename=US%2FLayout
&packedargs=c%3DL_Product_C2%2
6cid%3D1115416832406&pagename=
Linksys%2FCommon%2FVisitorWra
pper>
Some routers have third-party
firmware upgrades available that add
VPN server support. The Linksys
WRT54G is the most commonly
upgraded router, with the Sveasoft
firmware upgrade providing a variety of sophisticated features to what
Continued on Page 13
12
Virtual Private Networks Cont’d
from Page 12
Linksys provides.
<http://www.sveasoft.com/>
Quick Tiger Update
When Tiger shipped, it introduced a
VPN bug that slowed down certain
VPN connections. After I upgraded to
Tiger, a ping to my server through a
VPN connection took around a thousand milliseconds. Normal ping times
with my VPN are about 4 milliseconds.
This problem has been resolved
but requires upgrading to at least
Mac OS X 10.4.1 plus upgrading your
IPsec front-end. IPSecuritas version
2.1 and VPN Tracker 4.0.1 both work
properly Mac OS X 10.4.1 and later. At
the time of this writing, Check Point
had not updated their IPsec clients
to work with any version of Mac OS
X 10.4. Cisco’s latest release seems to
work fine for me. Again, verify the
software’s documentation show your
particular configuration is supported
before installing.
Cont’d from Page
Cover Story Con’td
from Page 6
The Double-edged Sword of
VPN
After selling you on the concept of
using VPN to bypass firewall rules,
I’m going to reveal that this is also
one of the biggest dangers in using a
VPN. Firewall rules exist to increase
security; bypassing that security in
any way creates very real risks. Many
companies are surprised to find themselves infected with Trojan horses and
viruses even though they had firewalls in place. It turns out that many
laptop users would go home, connect
to their unprotected home Internet
connections, get infected, then connect
via a VPN (bypassing all the firewall
rules) and spread the infection all over
the internal network. Of course, such
problems are less likely for Mac users,
but we still cannot become complacent.
Some VPN clients include a client
firewall, similar to the firewall built
into Mac OS X, to protect against these
types of vulnerabilities. Other clients
check a list of rules before a VPN connection is allowed. Some examples of
Apple’s Mighty Mouse. Brand new with this model is the
inclusion of an iSight camera. It is built into the bezel of
the iMac itself. It even has a built in LED to let you know
when the camera is in use.
Wait There’s More
A decent feature update to be sure. But the iMac update
also sports some unique features in software to take
advantage of the new hardware. Of course iChat AV is a
snap since the camera is already connected. But you can
use a new app called Photobooth to take pictures with the
iSight camera built into the unit. In low light situations the
screen of the computer will act as a flash. Jobs had a lot of
fun demoing the Photobooth app. You can take your pics
and e-mail them, use them for iChat icon, or say your user
icon for MacOS X. Photobooth also comes with some fun
filters and distortion effects.
There is one more software feature added with these models. Apple calls it Front Row. It’s for those who want to
browse their media files; music, video, dvd’s, and photo’s
from the sofa. Apple includes a really slimmed down
remote control, only 6 buttons, to run the program. With
the remote you can switch to Front Row. “Front Row
gives users a simple, intuitive and powerful way to play
their music, enjoy their photo slideshows, and watch their
DVDs and iMovies, as well as popular movie trailers from
apple.com and music videos and television shows pur-
rules include ensuring an up-to-date
anti-virus product is running, certain
security patches are installed, and the
computer’s firewall is running.
Even with these protections, you
shouldn’t allow any computer to connect to your network if you don’t
explicitly trust its maintenance and
security. The reverse is true too; you
shouldn’t connect your computer to
any networks that you don’t implicitly
trust; you may be opening yourself to
attackers on their network.
[Kevin van Haaren works for a
large corporation primarily supporting Windows computers, with
the occasional Mac call thrown in
to make the week more interesting.
This has prepared him well for the
job of herding his two cats.]
This article orginally appeared in
Tidbits Magazine issue #792, published 8/15/05. It is reprinted with
the permission of the Author.
chased from the iTunes Music Store, on their iMac from
up to 30 feet away using the new bundled Apple Remote”
(Apple)
Although he didn’t say it this is really an Media PC
interface. The idea of incorporating the computer into the
center of the home. So far the Wintel crowd hasn’t exactly
bowled anyone over with their offerings. Apple might be
poised to really transform this nascent market. This feature
alone makes me excited. This might just be Apple’s beginning movement into a new market, the living room of the
home. Personally I think the new iMacs are winners. They
offer the right combination of features and price to make
them attractive. This is going to be my next Mac.
October also saw a refresh of Apple’s entire Pro hardware lineup. Just in time for the busy holiday shopping
season.
The updates are welcome but are an exercise in balance. Apple is trying to make compelling PowerPC based
Macs to keep current sales strong. Yet it wants to postpone
enough new features so that the Intel based Macs have an
irresistible appeal to buyers.
PowerBooks
Apple needed to give the PowerBook a bit of a boost.
It had been over six months since the pro portable line
up had seen a refresh. The biggest features of the new
PowerBooks are battery life, higher resolution displays, and SuperDrives Continued on Page 16
13
Why DRM Offends the Sensibilities
by Adam C. Engst
T
HERE ARE MANY THINGS
in the world that you feel to be
true, but you’re not exactly sure
why. So if you’re a thinking person,
you’re left with this nagging suspicion
that you should be better able to come
up with a better explanation than “But
it’s just wrong!”
For many people, myself included,
digital rights management (DRM)
technologies fall into this category.
Even if we have no intention of breaking copyright law by downloading
music or movies willy-nilly, and even
though many of us earn our livings
through the production and sale
of copyrighted material, we’re still
offended that the entertainment and
media conglomerates of the world
- the Content Cartel, as one commentator has labeled them - are pushing
so hard to ensure that every song,
every movie, every television show,
is wrapped up tight in some form of
DRM that controls access to the content and use of it.
Thanks to a talk by Professor Dan
Burk of the University of Minnesota
Law School that was organized by
Cornell University’s Information
Science Department, I have a significantly better sense of just why DRM
makes my skin crawl. If you’re generally interested in the topic of DRM
and the law, I encourage you to read
the draft paper on which Professor
Burk based his talk.
<http://www.infosci.cornell.edu/
about/Feb02.html>
<http://www.infosci.cornell.edu/
about/burk.pdf>
Legal Rules versus Legal
Standards
As Professor Burk explained, the law
is broken down into two basic aspects:
rules and standards. A legal rule is a
specific imperative in which all the
thought surrounding the details of
the law takes place ahead of time. In
theory, at least, with a legal rule, the
body establishing the rule deliberates on specifics such as boundaries,
exceptions, penalties, and so on, and
for violators of the resulting law, there
is no leeway for interpretation. For
instance, consider a drug possession
law that states that offenders caught
with more than 5 grams of marijuana
must serve a 3 year prison term. If
some stupid pothead kid falls into
that category, regardless of any other
circumstances, it’s off to prison for 3
years.
Contrast that with a legal standard,
which essentially posits a goal and
lays down some guidelines for defining illegal behavior, but which leaves
significant room for interpretation. So,
instead of a rigid law stating exactly
what behavior is considered illegal
and mandating specific punishment, a
law based on a legal standard would
declare that drug possession was illegal, but would leave discretion in the
hands of the judge as to whether the
crime warrants a lesser punishment
(in the case of the pothead kid) or
greater punishment (in the case of a
known drug dealer caught with a kilo
of heroin).
I’m no legal scholar, but from a
common sense standpoint, I think
most people would prefer legal standards to legal rules. After all, laws are
created by politicians; would you trust
a politician - even one of the honorable ones - working with hypothetical
“what if” scenarios to define a crime
and a punishment? Or would you prefer that cases be decided by a judge
with the actual facts of a specific case
at her fingertips? Consider a law that
most of you have probably broken
in the last few days - the law against
speeding. Would you prefer a law
that said being caught driving over
the speed limit was grounds for an
automatic $200 fine, or one that gave
the police officer and the traffic court
leeway to see that driving a seriously
injured person to the emergency room
was grounds for dismissal?
As Professor Burk pointed out
to me in email subsequently, some
people do prefer rules to standards
for the simple reason that the rules
are predictable, so you know what to
expect beforehand. He also noted that
some people also become concerned
about judges having too much power,
although it seems to me that most of
the people who complain about “judicial activism” are politicians, and are
bent out of shape about having competition.
DRM: Them’s the Rules
Let’s step back a moment. Creating
a law is only one of many ways that
societally acceptable behaviors can be
encouraged. If society’s overall goal is
for people to drive more slowly and
cautiously, putting speed bumps in
the road would have the same effect,
as would keeping the road and shoulders narrow. Of course, those strategies have other downsides, such as
slowing down ambulances or making
it difficult for fire trucks to maneuver,
and they don’t absolutely prevent
the unwanted behavior, they just discourage it. You can still drive quickly
over speed bumps or along narrow
roads. In this respect, such extra-legal
strategies are akin to legal standards
- they leave some wiggle room in the
system.
DRM technologies fall roughly
into this category of extra-legal
methods of encouraging behavior,
but there’s at least one important difference: DRM, like all technology, is
an embodiment of a legal rule, not a
legal standard. It’s simply impossible
to create a DRM technology that can
evaluate and approve exceptions, no
matter how reasonable or legal they
may be. If you want to play a song
purchased from the iTunes Music
Store without stripping the DRM,
you must use an iPod or iTunes on an
authorized machine; there’s no wiggle
room at all.
This is a big deal because the law
that DRM instantiates is copyright
law, and copyright law is distinctly
a case of a legal standard. Copyright
law allows all sorts of exceptions,
including fair use, reproduction by
libraries and archives, and musical
performances at agricultural or horticultural fairs (I wonder how much
that last exemption cost?). Plus, in any
copyright infringement case, the judge
would have to take into account what
was copied, how it was copied, what
the intent was in copying, and the
harm done to the copyright owner in
the marketplace. No matter how hard
the Content Cartel tries to conflate
the two under the rubric of “piracy,”
there’s a big difference between the
downloading of a song from Kazaa
and the burning and reselling of thousands of DVDs of the latest Harry
Potter movie.
Cont’d on Page 15
14
Why DRM Offends Cont’d
from Page 14
<http://www.copyright.gov/title17/
92chap1.html>
So now you can see why DRM
rubs so many people the wrong way.
It’s turning copyright law, which is at
its heart a reasonable legal standard,
into a legal rule with no ifs, ands, or
buts.
Permission and Forgiveness
There’s another aspect to the way
DRM stands in for laws. No matter
whether we’re talking about legal
rules or legal standards, you’re still
free to do whatever you want and
then ask for forgiveness if you’re
caught. As a result, many violations of
the law are never noticed, and many
others never make it to court because
the cost to society of enforcing them
is higher than the benefit (a police
officer can make the decision that it’s
more important to get that injured
person to the hospital than it is to
enforce the speed limit).
However, the corollary to this
fact is that our laws thus reach further than we intend. Exceeding the
speed limit at any time is technically
a violation of the traffic laws, but no
one really believes that enforcing the
speed limit is so important that cars
should automatically inform the
police whenever you are speeding.
Similarly, every unauthorized copy
of a digital media file is technically
an infringement of copyright law, but
few people outside the RIAA probably
believe that every iPod owner should
be hauled into court to justify copying
music from a Mac to an iPod under
fair use.
So in the real world, we’re used
to asking for forgiveness after committing actions that are technically in
violation of a law (and frankly, we’re
used to getting away with a lot of
violations that are too trivial to justify enforcing). In the digital world,
however, DRM inverts this system,
forcing us instead to ask for permission rather than forgiveness. Anyone
who has ever been a teenager knows
just how problematic that is - parents
seldom agree to the cool stuff. When
it comes to technology, the end result
of being forced to ask for permission
is that experimentation and innovation are stifled. If the original Napster
and the other peer-to-peer file sharing
networks hadn’t scared the hidebound
music industry silly, do you think
they would ever have agreed to Apple
creating the iTunes Music Store?
Because most DRM systems start
from the written copyright law and
prevent any behavior that would technically be an infringement, they not
only fail to account for the exceptions
in copyright law, they also ignore our
societal expectations about how laws
should work in practice. It would
be like car manufacturers outfitting all cars with limiters that could
determine the posted speed limit on
any stretch of road and prevent the
car from driving faster than that, for
any reason. Talk about grounds for a
revolt!
Room to Move?
In fact, there is a little wiggle room
with DRM-protected content like
songs from the iTunes Music Store,
and that’s the fact that pretty much
every piece of DRM technology has
been broken. According to Professor
Burk, the peer-to-peer tracking company BigChampagne has found that
it takes about 4 minutes after release
for a song using copy-prevention technologies to appear on the file sharing
networks. So you could purchase a
song from the iTunes Music Store,
remove the FairPlay DRM in any one
of a variety of ways, and use it in
some way that would otherwise be
impossible.
But there’s a problem with creating
your own wiggle room by breaking a
DRM technology: our old friend the
DMCA (Digital Millennium Copyright
Act); see “The Evil That Is the
DMCA” in TidBITS-656_. The DMCA
distinguishes between _access_ of content and _usage_ of content (though
it’s a relatively fuzzy distinction), and
forbids any circumvention of access
control technologies. However, the
DMCA does not forbid the circumvention of usage control technologies; the thought is that this was the
loophole Congress left to allow fair
use of material that you had legally
purchased. However, the problem is
that the DMCA also bans the supplying of tools to circumvent _either_
access or usage control technologies.
In short, you can legally break any
usage control technologies you want,
but you can’t get any help doing it,
nor can you create tools for anyone
else to do it. Needless to say, this is a
barrier which essentially no one can
cross legally.
There is some hope that the courts
have recently seen the danger behind
the DMCA. In his talk, Professor Burk
called out a pair of cases where appellate courts had ruled against plaintiffs
brandishing the DMCA. In one case,
Chamberlain v. Skylink, Chamberlain
sued to prevent Skylink from reverse
engineering the codes necessary to
make Chamberlain’s garage doors
open; Skylink was reverse engineering the codes for use in a universal
garage door opener. The court ruled
that Congress had no such anti-competitive behavior in mind with the
DMCA. And in Lexmark v. Static
Control, the court ruled that Lexmark
could not use the DMCA to prevent
Static Control from reverse engineering the chips necessary to create offbrand toner cartridges for Lexmark
printers.
<http://www.eff.org/legal/cases/
Chamberlain_v_Skylink/>
The moral of this story, if there
is one, is that DRM technologies are
more subtly pernicious in their effect
than may be apparent from first
glance, due to the way in which they
embody legal rules and eliminate the
human effect in determining how
copyright law should be interpreted
and enforced. That realization does
little to assuage the annoyance many
people feel when their lives are unnecessarily complicated by DRM, but at
least it puts into words why DRM
is so often annoying, not to mention
concerning for the future of technological experimentation and innovation.
This artice originally appeared in
Tidbits Magazine #769, 3/7/2005,
and is reprinted with permission of
the Author.
15
Cover Story
Continued from Page 13
Continued
Mac and Windows that do all sorts of cool and useful
things, many of which will be tied directly to Yahoo’s
online content offerings. Developers will appreciate
not having to “scrape” Web sites to extract data for
their Widgets; users will appreciate cool, new crossplatform tools; and Yahoo will see their content (and
associated advertising efforts) reach new people in
new ways. Konfabulator is now available as a free 5.2
MB download, and requires Mac OS X 10.2 or later.
[GD]
<http://www.konfabulator.com/>
<http://widget.yahoo.com/>
<http://developer.yahoo.net/>
Apple Revenue Balloons to $3.5 Billion in
Third Quarter
Apple released its financial results for its last fiscal
quarter, recording a staggering $3.52 billion in revenue with $320 million in earnings. Both numbers
were substantially higher than analyst expectations.
The same quarter a year ago produced $2.01 billion
in revenue and $61 million in earnings. The company
reported selling over 6.1 million iPods last fiscal quarter, which ended 25-Jun-05. Apple also sold nearly 1.2
million Macintosh computers, a 35-percent increase
over a year ago.
<http://www.apple.com/pr/library/2005/jul/13results.
html>
Two interesting side facts: gross margins are up
from around 28 percent to nearly 30 percent, which
is magnificent in a commodity market in which all
competitors are seeing shrinking margins. The second
is that international sales were 39 percent of revenue. In its SEC filings, Apple broke out sales, showing
495,000 laptops sold and 687,000 desktops. Retail
sales accounted for 144,000 computers and $555
million in computer sales (not including other items).
The company expects to produce similar revenue and
earnings next quarter. Apple now has $7.5 billion in
cash and short-term investments on hand, and about
$7 billion in assets when considering all assets less all
liabilities. [GF]
iPhoto 5.0.3 Fixes Bugs
Apple last week released iPhoto 5.0.3, fixing a few
issues in the photo management program. Two improvements involve books: layouts no longer change
when moving an image, and a problem that caused
some book orders to be cancelled has been fixed.
Smart albums also now appear correctly in other iLife
programs.
Continued on Page 17
across the whole lineup.
Apple says that with the new
PowerBooks you can get up to
one more hour of battery life, at
least in the 15 &17 inch models.
The new higher resolution
displays,1680-by-1050 pixel resolution for the 17 inch and 1440by-960 pixel resolution for the 15
inch, represent a boost in screen
real estate of 36 and 26 percent
respectively. The screens are also
reportedly brighter than the previous PowerBook screens, up to
46% brighter.
All PowerBooks now feature
a slot loading SuperDrive, compatible with DVD =/- RW/CDRW. that can run up to 8x. You
also get Airport Extreme and
Bluetooth 2.0 +EDR with these
newer models.
A silent new feature is the
inclusion of 512MB of RAM
with the PowerBooks. Quietly
Apple has been upgrading the
installed memory in all Macs as
their respective line is refreshed.
Previously the installed memory
was not really enough to effectively use MacOS X let alone the
iLife apps.
The one feature that these
PowerBooks lack is an updated
processor. They still use the G4
processor running at the same
speeds as the last models, 1.51.67Ghz.
Power Mac
The Power Mac has been the
hardest hit by the failure of IBM
to produce faster processors.
Apple has managed to keep the
Power Mac relevant by including
dual processors in it’s models.
This month Apple released a new
line of Power Macs that feature
dual core G5 processors.
What’s the Difference Between
Dual Core and Dual Processors?
Dual processors meant that a
Power Mac had two separate
cpus. Think of them as two separate engines. A dual core Power
Mac has two engines mounted
on one cpu. The advantage is that
the dual core arrangement takes
up less space, and generates less
heat. So the machine is more
power efficient and runs cooler.
All of the new Power Mac’s
come with dual core processors.
They run 2.0-2.3Ghz per core for
the entry level to midrange. The
high end Power Mac sports a
dual processor, dual core arrangement. In effect that makes it a
quad core processor Mac running
at 2.5Ghz per core.
Processors aren’t the only new
features of these Power Macs.
These new models feature a new
expansion technology called PCI
Express. This faster connection
technology ushers in a new level
in graphics cards, NVIDIA’s
Quadro FX 4500. If you were to
fill up all four PCI Express slots
you could drive up to 8 displays.
You can also stock up these Macs
with lots of memory. The new
Power Macs can hold up to 16GB
of 533 MHz DDR2 SDRAM. Two
Gigabit Ethernet ports now come
standard. Airport Extreme and
Bluetooth 2.0 +EDR come built
in. Like the PowerBooks Apple
has quietly increased the installed
memory to 512MB. Also included
are a 16x SuperDrive with double-layer support (DVD+R DL/
DVD±RW/CD-RW); and ships
with Mighty Mouse and Apple
Keyboard.
Conclusion
This flurry of updates certainly
shows a vibrant Apple poised
to make 2006 a banner year. The
refreshed Macs are compelling
and offer enough features to lure
in current buyers. Very important
as Apple is gearing up to transition over to Intel processors.
Equally important is that Apple
keep innovating in the portable
music player space. The combination of video, the ITMS, iTunes 6,
and the stunning new iPod push
Apple even further out in front of
potential rivals.
16
Reality and Digital Pictures
Cont’d from Page 5
Continued
And lastly, with Mac OS X 10.4.2 installed,
editing an image no longer shifts its colors,
a bug that had caused significant consternation. The iPhoto 5.0.3 Update is available from Software Update as a 41 MB
download, or as a stand-alone 39.2 MB
download. [JLC]
<http://www.apple.com/support/downloads/iphoto503update.html>
Final Cut Studio Updates Available
Apple’s professional line of video editing applications saw updates last week to
fix bugs and improve performance. Final
Cut Pro 5.0.2, DVD Studio Pro 4.0.1, and
Soundtrack Pro 1.0.1 are each available as
separate downloads. If you own the entire
Final Cut Studio (which also includes
Motion 2), you can download a 46 MB
updater that applies the fixes to each
affected program. [JLC]
<http://www.apple.com/support/downloads/finalcutpro502update.html>
Apple Sells Its 500 Millionth Track
Apple announced that it sold the 500 millionth track via its iTunes Music Store on
17-Jul-05: the song was “Mississippi Girl” by
Faith Hill, and Apple’s giveaway winner is
Amy Greer from Lafayette, Indiana. She’ll
receive 10 iPods of her choosing, an iTMS
gift card for 10,000 songs, and a free trip
for four to see the band Coldplay perform. For the interminably curious, Apple
launched the iTunes Music Store over
two years ago in late April 2003, but just
crossed the 300-million-downloads mark in
March of this year. If iTMS’s sales remained
flat, Apple could expect to sell its one-billionth track in about a year; however, the
iPod’s still-growing sales and popularity will
probably bring that date much closer. [GD]
<http://www.apple.com/pr/library/2005/
jul/18itms.html>
Acrobat Vulnerabilities Fixed
Adobe has released Adobe Reader 7.0.2
and Adobe Acrobat Standard/Professional
7.0.2 for the Macintosh, in part to fix
a pair of security vulnerabilities and to
improve form handling. In one vulnerability, a malicious JavaScript embedded
Cont’d on Page 20
informed by learning and shaped by
convention. It is not realism but verisimilitude.
Photographs may seem realistic
but the technology of film prevents
escaping photographic conventions,
which are actually quite limiting.
Less limiting is a paintbrush. A brush
can produce every effect a camera
can plus a great many more. Before
photography, skilful and observant
artists spent millennia working out
how to represent reality on flat surfaces using this superior tool. Their
work forms the most complete guide
available on realistic ways to put pictures onto paper.
Most artistic techniques cope with
two basic problems, problems that
reflect the architecture of the visual
tissue of the brain: how to imply
something about form and space
using (1) areas of brightness and (2)
lines. These problems are not discrete
and isolated any more than the tissue
of the brain is, they are two sides of
the same coin, but it will simplify our
thinking to make a fuzzy distinction
between them.
Contrast
The eye does not see light per se,
it sees changes in light - contrast.
If two objects do not contrast with
one another, to the eye they meld
into one. This fact makes controlling
the contrast of adjacent details to be
paramount in importance. However,
the real contrast of any scene can
rarely be reproduced. As I said, the
range of reflectance from the lightest
to the darkest objects in a scene is
rarely less
than one thousand to one and often
exceeds one million to one, yet the
range of reflectance of pigment
against paper or canvas is approximately one hundred to one. On the
other hand, even within a contrasty
scene, small areas can have very little
contrast indeed.
From contrasting tones the brain
infers three-dimensional objects. It
does this through association, by
matching patterns it has encountered
before: a bright spot is a source of
light, brilliant yellow may be fire and
hot, areas that are darker tend to be
removed from you or from light,
bright areas tend to be near you or
near light, tiny highlights on a face
indicate sweat and heat, etc. To paint
realistically, painters use associations
like these to create optical illusions.
This is easy because the eye scrutinizes only tiny areas at a time, so the
brain cannot easily compare colours
and tones across broad distances.
As long as adjacent tones vary naturally, distant tones can be impossible
optically yet still look right. You can
see this in Rembrandt’s painting of
Belshazzar’s Feast, linked below.
The main source of light on the faces
appears to be the writing on the wall,
yet it is no brighter than the faces. It
is not white but fiery gold, yet it is so
far away from his face that nobody
notices the optical absurdity. Also,
with writing on the wall as the main
light, the secondary light reflected off
the invisible wall on the left ought
logically to be much dimmer than it
is.
<http://www.tidbits.com/resources/809/BelshazzarsFeast.jpg>
In other parts of the painting
Rembrandt increased contrast where
he had to maneuver within too limited a range to limit himself to variations in brightness. Look at the woman’s red dress to see an example. Not
only do the folds look three-dimensional overall, each tiny portion of
every fold looks three-dimensional,
even if you restrict your eye to small
areas, areas where there is little difference in brightness from highlight
to shadow. Every tiny part of the
dress contrasts with the part adjacent to it. Rembrandt could do this
because he did not vary brightness
alone, he varied hue and saturation
as well - independently. If you open
the picture in Photoshop and set the
Info window to HSB, you can move
the mouse around and see some of
this variation that has survived the
miniaturization of the painting. (The
real thing, which somebody long ago
trimmed to a smaller size and different angle, is 66” by 82” or 167 cm by
209 cm.)
Filmmakers and commercial
Cont’d on Page 19
17
GRAMUG News Continued from Page 2
ways that you can get around the issue. (Using one of a
number of programs designed to invoke those housekeeping chores manually.) While it’s not a critical issue running
those housekeeping chores does help insure that your Mac
runs smoothly.
There was a question asked if anyone was interested
in getting together for a picnic/social event this summer?
If you are please either reply directly to me, and I’ll forward the feedback along, or post to the Forums. Terry has
offered to organize the event but we need to know if there
is enough interest to get the ball rolling.
Our featured presentation was on MacOS X 10.4, aka
Tiger. There was so much to cover it took two presenters to
do the job. Terry Johnston focused his talk on the new feature Dashboard and Dashboard Widgets. Dashboard widgets are mini programs that perform a particular function.
You can find a bunch of them at Apple’s web site and Terry
also suggested checking out this site: <http://www.dashboardwidgets.com/>. Terry showed us some of his favorite widgets. They’re fun, cool, and useful little programs.
Next up was Kevin Woltjer who wanted to focus on a new
feature that isn’t getting as much press, Parental Controls,
as well as Spotlight and Smart Folders. Apple has quietly
added some pretty darn nice Parental controls to MacOS
X, if you use Apple’s applications like Mail and iChat. You
can restrict who can talk to your child in a chat session and
who can email them, among other things. If you’re concerned about your child’s computing, such as what they
can get into on the computer and on the Web, you should
give this feature a look. It is quite slick. Kevin then went
over Spotlight, the new fast searching technology built into
MacOS X Tiger. Although you can see demonstrations on
Apple’s web site as to Spotlight’s power it really is neat to
see it in person, ie a regular system. It is quick and handy.
I wouldn’t say, at this point that Folders are outdated, but
if Spotlight is developed farther I can see a day when you
won’t
have to
keep track
of which
folder
you put
something
in. Smart
folders are
a spin off
feature of
Spotlight.
In essence
they are
saved
searches
that look
like folders. You
can use
Shown abovie is Ms. Julie Wolf
them to
holding her prize, Toast 6. (April winner) help you
find things
again and
again. (Say
files for a
particular
project.)
Smart
folders
are being
adopted
into all of
Apple’s
apps. Look
for them
in Mail
and iPhoto
particularly.
During Shown abovie is Mr. Bob Koroknay Palicz
the pre- holding his prize, the Photo Coach. (Åpril
sentation
winner)
several good
questions were raised. Spotlight questions included: How
it worked (Answer: by indexing your entire hard drive
when you first install Tiger and thereafter it adds files
and folders to an index in real time.) How long it took to
index and if it took much time to index after the first run.
(Answer: First time that Spotlight runs plan on it taking
45-60 minutes. More if you have a really large hard drive
with lots of files. After that indexing takes practically no
time.) Any problems with applications running under
Tiger? (Answer: For the most part no. However some programs do have to be updated for Tiger. You can check sites
like www.macintouch.com or macfixit.com for lists of programs that require updating.)
We conluded the meeting by holding a raffle. Our winners included Jim Fawcett (A new member who loudly
said he’d never win this time around.) who won iLife ‘04.
Cynthia
was our
grand
prize winner. She
won Tiger.
(There
was a
third winner, but
darn it I
didn’t get
the name
down
and it has
slipped
my mind.
Apologies
on that.) Shown abovie is Mr. Jim Fawcett holding
his prize. A copy of iLife ‘04. (May winner)
18
Reality Cont’d from Page 17
photographers create realistic photos
similarly, by “cheating” lamps that are
put on the set as props, lighting the
set so that the light seems to be coming from those props. An example is
the picture of the blacksmith at the
link
below. A logical analysis shows that
no illumination can have come from
the fire, but the eye is not a logical
analyser. However, cheating like this
takes more time than cheating on your
taxes, especially in a still photograph
where the illusion does not flit past
your eye. That photograph took me
a day to plan and a day to execute.
(Among other things, I needed to
wrap the entire workshop in aluminum foil, to prevent light from coming
through chinks in the walls.)
On the other hand, equivalent
results can often be obtained without
cheating by using a good digital camera and re-balancing the light digitally.
An example is the dyer in the picture
linked below. The version on the
right shows the scene as film would
have caught it; the version on the left
shows it as it felt and as I remember it
to be. It is probable that before I took
the picture, I noticed that the room
light was bluer than the firelight - I
do tend to notice such things - but my
overwhelming perception was overwhelming heat and that heat is what
I wanted to portray. To the visual system, so many cues to heat are present
that the firelight in his face looks natural although it’s logically absurd.
The next example shows a more
ordinary picture. The image on top
shows what the scene looked like: a
brightly lit bush in the foreground
with a jungle of trees in the hills
behind, gradually diminishing in size
and clarity. However, although my
brain perceived the bush to be bright,
it was actually dark compared to the
sky and the jungle was even darker.
The scene presented a range of tones
that nothing man-made can come
close to reproducing. My camera’s
sensor “mechanically” compressed
those tones into the image on the bottom. Slide film would have done the
same. To make the picture look more
realistic, I brightened the bush in the
foreground and painted contrast into
the jungle by varying saturation and
brightness independently from each
other and from hue.
<http://www.tidbits.com/resources/809/Jungle.jpg>
To manipulate contrast in this way
requires three things:
* Capturing the information that you
want to bring out.
* Making that information visible by
lightening shadows and/or
darkening highlights.
* Adjusting colour not to make it look
accurate - that is
impossible - but to bring out whatever contrasts are necessary
to make it look right
To meet the first requirement, you
need a raw, unprocessed image (not a
JPEG) from a camera that can record
a broad range of contrasts. In today’s
market this means a single-lens reflex
camera. (For more information, see the
“Image Quality” section of my article
“Picking a Point-and-Shoot Camera:
Panasonic DMC-FX7” in TidBITS-783_
.) When I convert the file to a standard
format (I prefer the generic TIFF to
Adobe’s PSD), I set its levels of tonality to run the full extreme from black
to white, with the middle set to look
as good as possible.
for the full Photoshop. The other reason is that Elements has limited facilities to handle 16-bit colour. Although
8-bit colour is usually sufficient, pulling apart tonality often requires finer
intermediate colours to be present.)
Now look at the Rembrandt picture
again, at the detail on Belshazaar’s
cape. The detail stands out because
it is formed by brush-strokes with
extremely high contrast from one to
the next, extremely high local contrast. I make detail stand out in a
photograph the same way by using
an incidental feature of PictureCode’s
Noise Ninja, which is primarily a
noise-reduction package (and one of
the best). This feature is a slider that
enhances local contrast. I often use it
by itself without any noise reduction
at all.
<http://www.tidbits.com/resources/809/BelshazzarsFeast.jpg>
<http://www.picturecode.com/>
Now comes the paint. If an artist wants to adjust a colour on his
canvas, he may change its hue, or he
may daub on spots of complementary
colours to reduce its saturation, or he
may add some black or white touches
to reduce or increase its brightness.
With digital photographs I want to do
the same. The product that enables me
to do this is Asiva Shift+Gain.
<http://www.asiva.com/>
Shift+Gain is a Photoshop plugin
that lets you select areas or lines
Lightening shadows and dark(useful
to remove colour fringing)
ening highlights comes next, with
by
any
combination
of hue, saturaAdobe’s Shadows/Highlights contion,
and
brightness,
and then alter
trol. Photoshop defines shadows and
those
parameters
individually.
No
highlights as dark or light areas larger
other
product
can
do
this,
except
for a
than a certain number of pixels across.
standalone
package
from
Asiva
that
CS, CS2 and Elements all enable
is too slow to use. Indeed, incredible
adjusting the amount of lightening or
darkening but CS and CS2 also enable as it may sound, Asiva has a U.S. patent on this approach to manipulating
adjusting the size of what Photoshop
pictures.
sees as a shadow or highlight. I find
Shift+Gain works differently
that adjustment to be very important,
from
any other application and took
and I use it for maybe one photo in
some
time to understand. However,
three.
although it was confusing at first, it
soon came to seem simple. To accom(Most of what Adobe left out of
plish
in Photoshop most of what I do
Photoshop Elements I do not care
in
Shift+Gain
would require far more
about - Elements is already more comskill
and
patience
than I can supply.
plex than it needs to be - but I found
I
find
Shift+Gain
to be an indisthis one adjustment almost reason
pensenough by itself to forgo Elements
Cont’d on Page 22
able
19
News Cont’d from Page 17
within a PDF file could launch an arbitrary
application on your Mac, at least as long
as the exact application and path name is
known in advance by the attacker. In the
second vulnerability, the updater for Adobe
Reader and Acrobat could either elevate
the permissions of a pre-existing Safari
Frameworks folder or create such a folder
with elevated permissions.
<http://www.adobe.com/support/techdocs/331709.html>
The free 7.0.2 updaters work only
on version 7.0.1; if you haven’t already
updated from 7.0 to 7.0.1, you must do
so before updating to 7.0.2. You can either
download the updates manually from the
URLs below or use the Check for Updates
Now command in the Help menu of each
program, after which the Adobe Update
Manager application will download and
install the update automatically. The Adobe
Reader update is an 11.2 MB download;
the Acrobat Standard/Professional downloads check in at 99.6 MB. [ACE]
<http://www.adobe.com/support/downloads/product.jsp?product=10&
platform=Macintosh>
QuicKeys X3 3.1 Supports
Automator, Adds Toolbars
Startly Technologies has released QuicKeys
X3 version 3.1, adding support for incorporating Automator workflows into
QuicKeys shortcuts and bringing back
SoftKeys, which provides a translucent
toolbar with 10 slots for holding shortcuts. Smaller improvements include a new
option for the Open Items action that lets
you specify on the fly which application to
use, the Action Palette for providing faster
access to shortcuts within QuicKeys Editor,
and the capability to trigger shortcuts
based on the mounting or dismounting
of specific drives or network volumes. For
more about QuicKeys X3, see “QuicKeys
X3 at the Crossroads” in TidBITS-767_.
QuicKeys X3 3.1 requires Mac OS X
10.3.9 or later and is a 14.1 MB download.
It’s a free update for users of QuicKeys X3;
updates from previous
versions run between $30 and $70, and
new copies cost $100. [ACE]
<http://www.quickeys.com/products/qkx.
html>
Virtual PC 7.0.2 Gains Full Tiger
Date & Contact 5.0 will feature a new Take
Compatibility
Control user manual written by Joe Kissell;
Microsoft has released Virtual PC 7.0.2,
it should be available in the relatively near
a free minor update that provides full
future. The upgrade to Now Up-to-Date
compatibility with Mac OS X 10.4 Tiger.
& Contact 5.0 from version 4.x costs $50,
In particular, the update fixes problems
and there’s a 30-day free trial version available as a 13.9 MB download. [ACE]
under Tiger with Virtual Switch, Zero
<http://www.nowsoftware.com/>
Configuration Printing, and the Dock Start
Menu. The update is a 17 MB download
Eudora 6.2.3 Fixes IMAP Bug
and will update versions 7.0 and 7.0.1.
Qualcomm has released Eudora 6.2.3, a
Microsoft also announced that new copies of Virtual PC 7 purchased before 30free update designed largely to fix the
Sep-05 would be eligible for a $30 rebate.
annoying IMAP bug that could result in lost
[ACE]
messages (see “Qualcomm Acknowledges
<http://www.microsoft.com/mac/downloads. Eudora Bug” in TidBITS-781_). Along with
aspx?pid=download&location=
that bug, the new version squashes a
/mac/download/misc/vpc7_0_2.xml>
variety of other bugs, adds a few x-eudorasettings for esoteric needs, and adds a
Apple Says Goodbye to Grayscale
checkbox to send mail through the SMTP
iPods
submission port (587) in the Sending Mail
In conjunction with the release of iTunes
settings panel. Also worth noting is that
4.9, Apple merged its iPod and iPod photo
Qualcomm has relaxed their approach
product lines. Gone are the black and
to requiring payment for new Paid-mode
white screens that appear on most current updates 12 months after the last payment;
iPods - it’s all color now. The new lineup
until further notice, updates that change
includes a 20 GB iPod for $300 and a 60
only the third digit (the 3 in 6.2.3) won’t
GB iPod for $400. Apple also introduced
trigger the need to pay for a new version
a 20 GB iPod U2 edition (black body, now
even if more than 12 months have passed.
color screen) for $330. At the same time,
Eudora 6.2.3 requires Mac OS X, is compatible with Mac OS X 10.4 Tiger, and is a
the price of the 1 GB iPod shuffle has
7.8 MB download. Finally, Qualcomm has
been reduced to $130. [JLC]
announced that the next major version of
<http://www.apple.com/ipod/>
Eudora will be a significant rewrite, which
is necessary to take advantage of new
Now Up-to-Date & Contact 5.0
Released
technologies such as Spotlight and WebKit.
Now Software has released Now Up-to[ACE]
Date & Contact 5.0, the latest version of
<http://www.eudora.com/download/>
the company’s long-standing multi-user
<http://www.eudora.com/download/eudora/mac/6.2.3/RelNotes623.txt>
calendar and contact management software. New features include a Schedule
View for seeing multiple people’s schedules Opera 8 Boasts Speed and Security
simultaneously, a single interface to manage Opera Software has released the latest
version of its Web browser, Opera 8 for
multiple calendar and contact servers, the
Macintosh. This version brings to the Mac
capability to subscribe to iCal calendars,
vCard and iCalendar support, a redesigned the features available on Opera’s Windows
and Linux browsers, including faster page
interface for a more modern look and
loading, native Scalable Vector Graphic
improved ease-of-use, and customizable
toolbars. The update also provides compat- support (SVG 1.1 Tiny), enhanced privacy
ibility with Mac OS X 10.4 Tiger, and Now
features, and Opera’s Extensible Rendering
Software plans a free update for later in
Architecture (ERA) to adjust page appearance based on the size of the browser
the year to add support for Tiger-specific
window. Opera 8 requires Mac OS X 10.2
features like Dashboard, Spotlight, and
or later and is a 5.5 MB download. A limitmost importantly, SyncServices, enabling
ed version can be used for free, or you can
Now Up-to-Date & Contact to share
purchase the full version for $40. [JLC]
data with any other SyncServices-aware
<http://www.opera.com/>
application or device. (Roughly speaking,
SyncServices is the system-level version of
Security Update 2005-006 Released
iSync that promises to provide more generalized synchronization capabilities.) And
Apple released Security Update
last, but certainly not least, Now Up-toCont’d on Page 21
20
News Cont’d from Page 20
2005-006 last week, fixing the usual miscellany of possible security holes in services such as the AFP Server, Bluetooth,
CoreGraphics, folder permissions, launchd,
LaunchServices, MCX Client, NFS, PHP,
and the VPN server. All of the holes apply
to Mac OS 10.4 Tiger (both client and
server versions), but only the Bluetooth
and PHP fixes are relevant for those still
running Panther, and the VPN fix was
already rolled into Mac OS 10.3.9 by a
previous security update. For full details,
see Apple’s description; the download
ranges from 3.9 MB to
6.4 MB, depending on the version you
need and whether you get it via Software
Update or as a stand-alone download.
[ACE]
<http://docs.info.apple.com/article.
html?artnum=301742>
Snapz Pro X 2.0.2 Provides Tiger
Compatibility
Ambrosia Software has released Snapz Pro
X 2.0.2, a minor upgrade to the company’s
essential screen capture software. The
upgrade provides full Tiger compatibility,
fixes a few bugs, is localized for Traditional
Chinese, and includes an uninstaller. Every
author I know relies on Snapz Pro X for
screenshots, and although this is clearly
not a major upgrade, it’s worth keeping
up with the latest version. The upgrade is
free to registered customers; Snapz Pro X
normally costs $30 for still screen captures,
or $70 for the version that can capture
actions as movies.
<http://www.ambrosiasw.com/utilities/
snapzprox/>
(Interestingly, in Tiger Apple changed
the file format for screenshots captured
with Command-Shift-3/4 from PDF to
PNG, perhaps because PNG files can be
used in Web pages more easily than PDF
files (PNG support is widespread in modern programs). Although everyone I know
who’s serious about screenshots uses
Snapz Pro X, in which you can choose the
file format, you can also use Apple’s Grab
utility to take screenshots in TIFF format,
and you can even use File > Grab in Tiger’s
version of Preview to capture a screenshot directly into Preview, at which point
you can use Save As to save it to PDF or
another supported format.) [ACE]
QuickTime 7.0.1 Fixes Security
Hole
Apple has released QuickTime 7.0.1, a 26.6
MB download via Software Update. This
update replaces the Quartz Composer
plug-in, which was found to be capable
of sending local data to an arbitrary Web
location using an encoded URL. The new
component prevents this from happening. QuickTime 7.0.1 supports Mac OS X
10.3.9 or later.
<http://docs.info.apple.com/article.
html?artnum=301714>
QuickTime 7.0.1 also includes unspecified bug fixes and allegedly improves
compatibility with Apple’s Final Cut Studio.
TidBITS Technical Editor Geoff Duncan
discovered fixes for a couple of annoying
QuickTime 7 problems on multi-channel audio interfaces: QuickTime 7.0.1
respects the user’s default stereo output
pair (where version 7.0 sent stereo audio
only to channels 1 and 2 - bummer if your
speakers are connected to outputs 3 and
4!), and version 7.0.1 plays monophonic
audio correctly. [JLC]
Apple Recalls Laptop Batteries
Apple has announced a voluntary recall
of certain rechargeable laptop batteries
sold with, or sold separately for use with,
its 12-inch iBook G4, 12-inch PowerBook
G4, and 15-inch PowerBook G4 models
from Oct-04 through May-05. The company, which acted in cooperation with the
United States Consumer Product Safety
Commission and international authorities,
says the affected batteries could overheat,
posing a potential fire hazard. The batteries
will be replaced at no cost to the owner.
<http://www.apple.com/support/batteryexchange/>
today released Fetch 5, a sleek new version of the earliest FTP client still in active
development for the Macintosh. With
Fetch 5, Jim focused on simplifying the
user interface to improve ease of use and
adding support for low-level technologies like SFTP. Fetch now sports a new
toolbar for quick access to commonly
used functions, Back and Recent buttons
for easier navigation to previously viewed
folders, a more Finder-like list view, and a
status pane at the bottom of each transfer
window. Other interface niceties include
a file transfer progress indicator in Fetch’s
Dock icon, context- sensitive help, and a
recent connections pop-up menu in the
New Connection dialog. Under the hood,
along with SFTP support, Fetch 5 now
offers resuming of binary uploads, automatic detection of FTP and SFTP servers
on your local network if they advertise
their presence via Bonjour (formerly called
Rendezvous), importing of Interarchy and
Transmit bookmarks, support for using
StuffIt to compress files automatically on
upload and expand automatically on download, improved handling of non-ASCII and
Unicode file names, and “Automatic Passive
Mode” for automatic detection of proper
connection modes for reliable transfers
through firewalls and NAT gateways. Fetch
5 works with Mac OS X 10.2.4 or later
(including Tiger), and it costs $25, with
upgrades from Fetch 4 priced at $15. New
copies of Fetch and upgrades may both
be purchased directly from within Fetch
5; choose Purchase or Purchase Upgrade
from the Fetch application menu. Users
at educational and non-profit charitable
organizations may apply for a free license.
[ACE]
<http://www.fetchsoftworks.com/>
The recalled batteries include those
with model numbers A1061, A1078, and
A1079, and have serial numbers that begin
with HQ441 through HQ507, and 3X446
through 3X510. There are unaffected batteries with the same model numbers but
different serial numbers, so check both.
After verifying the battery is from the
affected batches, Apple will ship a replacement battery at no charge to the user,
who will then return the original battery
using the same packaging and an included
pre-paid shipping label. [MHA]
Fetch 5 Ready for a Walk
Proving that you can teach an old dog new
tricks, Jim Matthews and Fetch Softworks
21
Reality and Digital Pictures tool
for
Cont’d from Page 19
digital photography - the only indispensable tool, the only tool for which I do
not know of any functional equivalent. Unfortunately,
it will not work in any application
other than Photoshop, not even applications like GraphicConverter that can
run most other Photoshop plug-ins. It
is compatible with any recent version
of Photoshop, but it does require
Photoshop, which is why I am ignoring possible alternatives to Photoshop
in this article.
Those three sets of tools can handle
nearly all the manipulations of contrast and colour that I have had any
need for: (1) the controls in Photoshop
CS/CS2 for levels, shadows and highlights, (2) the local-contrast control in
Noise Ninja, and (3) Asiva Shift+Gain.
Occasionally I also use one of Asiva’s
other plug-ins, which work similarly
but do slightly different things. I have
found that Asiva’s plug-ins, combined
with Photoshop’s basic selection
tools, obviate the need for masking to
achieve ordinary pictorial effects.
Only one of Photoshop’s colour
adjustments do I find to be particularly useful. Sometimes, after I have
adjusted the colours to bring out contrasts, the picture shows an overall
tint. Now, no tint exists on its own,
a tint is merely an offset from a standard of comparison. In a photograph,
the eye’s standard is usually a pure
white highlight or the paper’s margin. If a neutral white or grey looks
coloured in comparison, then we see
a tint. Removing a tint is usually a
simple matter of shading the picture
just enough to neutralize that white
or grey. Every other colour changes a
bit, but the contrasts among them will
remain. It’s difficult to remove a tint
manually because the brain adapts so
readily to changes in colour that a
wide range of adjustments seems
okay until you print out the picture.
Photoshop can remove a tint mechanically; the mechanism is hidden in the
Match Color command.
One final consideration about
colour comes with dim light. In sunlight we see in colour; in moonlight
we see in monochrome; in transitional
“mesopic” levels of dim light we see
partially in monochrome and partially in colour. When painters want
to represent dim light, they portray it
mesopically. You can see this with the
musician at the back of the Rembrandt
and you can see it even better in the
Gross Clinic by Thomas Eakins,
the picture on the left at the link
below. The students in the shadows
are nearly monochromatic but the
monochrome contains hints of colour,
often quasi-random streaks and
blotches. (Note that the original painting is 96” by 78” or 243 cm by 198
cm.)
<http://www.tidbits.com/resources/809/GrossAbattoirFlowers.jpg>
Film does not portray dim light
in this way, nor do most digital sensors, but the Foveon sensor does.
(See “Sense & Sensors in Digital
Photography” in TidBITS-751_ and
my followup for a discussion of sensor types.) Film and digital sensors
generate low levels of granular noise.
When a normal amount of light
strikes the film or sensor, the noise is
usually hidden within the image, but
when little light strikes it, the noise
becomes more evident. At some dim
exposure to light the image disappears within the noise: that defines
the limit of sensitivity. The random
dots of this noise can be smoothed
over but detail becomes smoothed
over with them and at the limit of sensitivity, all detail disappears. However
the Foveon image sensor works differently so its granularity looks different. The Foveon shows fewer specks
but replaces them with intrusions of
incorrect colour. At first this reduces
saturation then, at the lowest levels of
sensitivity, it causes random streaks
and blotches.
Reduced saturation and random
streaks and blotches of colour are
exactly the techniques that artists
use to represent dim light, and the
Foveon’s noise can be used to do the
same. I smooth out the granular noise
with Noise Ninja - there is rarely so
much of this that Noise Ninja loses
any detail - then I use Shift+Gain on
selected areas to control the discolouration. My goal is sufficient discolouration to add contrast for the eye but
not so much as to be noticed. You can
see the effect in the Chinese abattoir to
the right of the Gross Clinic painting
you just loaded.
Do note, though, that desaturation and blotchiness are not the norm
in Foveon photos. They are normally
hidden in depths of black and become
evident only if you bring them out
by pushing the sensor to its limits.
More normal is the picture of the
flower market - the third one on the
page. I took both pictures indoors and
exposed them at ISO 1600.
Perspective
So far we have been talking about
how to represent space using tonality,
now let’s shift to representing space
using lines. This is the problem of perspective.
During the Italian Renaissance, artists worked out a geometry of linear
perspective, geometry that appears
superficially to fit perceptual norms.
In fact, however, it does not. The
“laws” of linear perspective need usually to be broken, else the picture will
look wrong.
The laws of perspective dictate that
parallel receding lines converge. They
converge if they are receding horizontally like railway tracks and they converge if they are receding vertically
like skyscrapers seen from the street.
But consider vertical perspective. If
the angle of view portrayed is only a
little bit upward, then your brain may
not infer that objects are converging at
a distance above you, your brain may
infer that the objects are not plumb.
Of course, if those objects are walls of
buildings, then your brain concludes
that they are not falling inwards, for
just as you assume that boards are
straight, so do you assume that walls
are plumb. However, for the same
reason - because you assume that
walls are plumb - buildings look more
natural when all the vertical lines are
upright and parallel. You can see an
example of this issue in the two images of the temple pictured at the link
below. A correction like the top image
with film would have required the
careful adjustment of a view camera
on a tripod but it took me two minutes in Photoshop. (Elements or CS
can fix perspective but CS2 makes it
easier through a new Lens Correction
item in the Filter > Distort submenu.)
Cont’d on Page 23
22
Reality and Digital Pictures
Cont’d from Page 22
<http://www.tidbits.com/resources/809/VerticalLines.jpg>
The same adjustment is useful for
horizontal lines. When horizontal
lines converge, buildings can appear
to be constructed on a hill and roofs
can seem to have unusual inclines.
To minimize ambiguity, vertical lines
ought to be plumb and horizontal
lines ought to be level unless the
reason for them not to be is obvious. Clear verticals and horizontals
provide a frame of reference that lets
oblique lines stand out.
Pictures of buildings obviously
benefit from this approach, but often
pictures of people do too, although
more subtly. You can see an example
in these two pictures of children,
linked below. The picture on the top
is stronger because the children are
sitting on a level platform, not a tilted
one.
<http://www.tidbits.com/resources/809/Children.jpg>
In fact, the laws of linear perspective need to be violated even when
photographing something straight on.
If you look straight at a picket fence
or a wall of bookshelves, an optically correct perspective would have
the lines of the fence or bookshelves
converging both to the left and to the
right. This would look so silly that
nobody would paint them this wayFor the same reason, camera lenses are
corrected to distort linear perspective
so that a rectilinear object casts a rectilinear image.
This presents an interesting problem that can be solved with a brush
or computer but not with film. The
farther out from the centre an object
extends, the farther its lines will be
pulled apart and thus the more it will
be enlarged, yet objects in the centre
will never be enlarged, distorting relative sizes. The wider the lens’s angle
of view, the greater the distortion.
This distortion can be seen with any
wide-angle lens and becomes disproportionately more severe the wider
the angle of view. When straight lines
are not involved - in many landscapes
- it often looks more natural when
relative sizes are maintained at the
expense of convergence. This can be
approximated in Photoshop CS2 by
adding convex “barrel” distortion, a
distortion that reduces the rectilinear
correction of the lens.
(Note that only CS2 offers that
control. CS2 also makes it significantly
easier than CS or Elements to correct converging and tilting lines, once
you find the new controls. In CS2,
all of the lens corrections are buried
under Filters > Distort, although File
> Render still shows the subset of corrections that is shared with CS and
Elements.)
Of course, adding convex distortion is unacceptable if straight lines
are involved. A certain amount of
convex distortion may not be noticed
in landscapes, but curvature stands
out absurdly in pictures containing
buildings. An alternative fudge is to
squeeze the picture from the sides. To
do this I use a $20 Photoshop plug-in
called Squeeze.
<http://www.theimagingfactory.
com/>
I also ought to mention the portrayal of depth through having only
one plane of the picture in focus. This
effect can be achieved with a brush,
but it rarely is, because it does not
mirror what the eye sees or the brain
perceives. The eye sees only tiny spots
sharply, and it sees tiny spots wherever it looks: from these the brain
perceives infinite depth of field. To
control attention and suggest different
qualities, a painter will vary the softness of edges across a picture, but this
variation is much more subtle than a
mis-focussed lens.
To vary hardness and softness
within a picture, I used to use a view
camera that allowed me to tilt and
swivel the lens, and I varied the character of the light. A digital camera
makes this a lot easier. My digital
camera usually provides infinite depth
of field with no special measures and
I can use digital techniques to control
softness like a painter, as I did in the
flower market example previously
shown. The flowers just behind the
smiling girl are soft, but the ferns
behind them are sharp, as is every
other object in the picture except for
the woman moving into it.
This was possible for two reasons,
both tied to the camera’s image sensor. First, the ISO speed of negative
film is based on the least exposure
necessary for acceptable snapshots. To
extract high quality usually requires
doubling the metered exposure. In
contrast, to extract the best quality
from my digital SLR, I usually halve
the exposure. That is two f-stops’
difference, which represents a lot of
depth of field. On top of that, the
sensor in my camera is smaller than
35mm film, which means the same
f-stop gives more depth of field. The
difference is 1-2/3 stops. Thus, for any
given amount of light, I obtain nearly
four f-stops’ more depth of field than
I would get were I shooting 35mm
negative film.
When everything is sharp within a
photograph, photographic compositions open up. People don’t just look
at my pictures, they look inside them,
combing them for detail - and they
find it, because I have controlled the
details’ contrast. With so much information to look at, my 8” x 10” (A4)
printer seemed too small. Next week
you can read a discussion of printers
and my search for a larger one.
Finally, to finish up my comparison
of the various versions of Photoshop,
I ought to mention two new features
of CS2 that are useful for preparing enlargements, a “spot healing
brush” and “smart sharpening.” The
former I find to be a modest but significant convenience, but the latter is
an important feature. It tightens up a
lens’s inescapable spreading of points
into blurry circles, and it reduces blur
from movement. In my mind, this feature combined with CS2’s improved
distortion controls makes the upgrade
from CS worth the purchase. I detest a
Windows-like copy-protection scheme
that Adobe have begun to employ - it
prohibits the fair use of your purchase
if you work in different locations - but
I swear at CS2 less often than I did at
its predecessors because it permits me
to hide from sight the vast number
of menus that I never use and to edit
or remove keyboard shortcuts. With
CS2, no longer do windows fly about
the screen and change their colour
because one of my fingers inadvertently touched a key.
This article orginally appeared in
Tidbits Magazine #809, 12/12/05,
and is reprinted with permission of
the Author.
23
Grand Rapids Area Microcomputer Users Group
Our meetings are held monthly. We meet on the fourth full week’s
Thursday of each month. We gather at the Grand Rapids CompUSA.
Meetings start at 7pm and are concluded at 9pm. Meetings are open
to the public, and are free. Membership is only $25 for one year.
Membership entitles you to user group discounts, entry in drawings
(must be present to win), our periodic email list, and our newsletter. Our
web page can be found at: http://www.gramug.org
For further information you can contact our president at:
[email protected]
$pecial$ & Deal$
We would like to give
special thanks to the following organizations who
contributed to this publication
The following deals or specials are provided as a courtesy to our readers. The specials outlined
below may no longer be available by the time you read this. For more timely information stop by
a GRAMUG meeting.
Special Member Discount Offer on Internet Service
GRAMUG has teamed up with Iserv, the largest independent ISP in West Michigan, to
offer our members a great deal on Internet access.†
www.iserv.net
The offer consists of the following:
Unlimited dialup Internet access for only $16.95/mo FREE activation (a $20 savings)
Up to 10 email addresses, 7 megabytes of personal webspace. Customer support 7 days
a week Local access numbers across all of lower Michigan (and parts of the UP)
To take advantage of this special offer, call Iserv locally at 493-3740 or toll-free at 1888-64-ISERV. Be sure to mention that you are a member of the GR Apple Macintosh
Users Group in order to receive the discount. (Please say the group name like that, it
will make the process go faster;) If you would like to sign up via the online sign up
form, found at <http://www.iserv.net/> contact our President for the code. There is a
special code you must enter in order to get the special rate. This offer is valid ONLY for
User Group Members.
(†Offer valid only on new accounts.)
onOne Software: 20 Percent Discount on Photoshop Plug-Ins
onOne Software provides solutions for digital photographers using Adobe Photoshop or
Photoshop Elements. Solutions include Genuine Fractals 4.1 for high-quality image scaling and large format printing, PhotoFrame 2.5 for creating unique, high-quality image
borders and effects, Mask Pro 3 for masking images for composites and Intellihance Pro
for enhancing digital photographs.
*Further information provided
to GRAMUG
members. Stop
by and join
today.
This special user group offer will take 20 percent off your entire purchase.
http://www.ononesoftware.com
Other World Computing: Selected Discounts
Other World Computing (OWC) has sold and supported quality Apple hardware products at competitive prices since 1998. OWC has partnered with Newer Technology, Inc.,
to provide high-capacity batteries for iPods and PowerBooks and launched http://
www.FasterMac.net to get Mac users surfing faster.
With this offer, user group members can take 5 percent off any NewerTech miniStack
FireWire kit/solution, and 10 percent off any NewerTech Battery (iBook, PowerBook or
iPod). This offer carries a limit of one coupon per item and one discount per customer
per order.
See these great products.
http://www.macsales.com
*Further information provided to GRAMUG members. Stop by and
join today.