Get rid of MacKeeper

MacKeeper is clearly identified as Malware. There is no good to be had.

As a Mac technician I have had enough of this abomination on our untarnished Mac operating system. Enough of ridding client after client of this menace.


Don’t download or install MacKeeper!

If you find its nasty existence on any Mac. (Look for the racing driver in helmet icon in the top right of the screen to identify it.)

Follow the excellent instruction of

My article is not to rehash what they so nicely outline but to help with 1 or 2 points that could assist in ridding us of this demon.

Useful tips:

Don’t bother with the manual method of removal.

Scroll down the page and click on the link to download FastTasks 2 (for OS X 10.9 or later) or DetectX (for earlier versions of OS X)

Don’t skip the additional steps after clearing files with the above apps: In Safari, Reset ALL. Run Keychain app and search for “zeobit” and “MacKeeper” delete any Keychain entries for those.

Use the FastTask 2 Menu and select Show Hidden Files. YAY! no UNIX. That will get you to the mean .34788453 or similar hidden file that MacKeeper creates.

NEVER allow the MacKeeper uninstall app to complete! It might launch itself while you are moving it’s files to the Trash. You may need to hold down the power button of your Mac to Force shutdown rather than complete the uninstall process provided by MacKeeper. On restart you should be able to empty Trash without the uninstaller auto launching. The MacKeeper Uninstaller actually installs many more problems.

Run the Uninstaller for either of the apps used to clear the infection. They are not needed after the job is done.

Educate the Mac user so they do not re-install MacKeeper in the future!




iPhone multilingualism

If you have an iPhone and type in a language other than the main language setup on the phone, you can ad keyboards to type in that language. This will make auto type work correctly in that language as you typAUTO CORRECT DISASTERSe.


– On your iPhone got to General settings.

– In General Settings click Keyboard

– In the Keyboard options list you will find an option to ad a keyboard.

– Ad the keyboard/s of the additional language/s you type in.

When you type on the iPhone keyboard note the little globe icon on the bottom left.

– Click and hold the little globe icon to select the language that you want to type in.

Presto! auto type is tamed.


How to backup and file your Cloud based mail:

It’s common practice to have IMAP, iCloud, GoogleMAIL etc email addresses. Many people store and file all their mail in one or many of these Cloud based mail systems.
If/When these accounts are hacked the criminal will not only attempt his extortion tricks on your address book contacts, they might delete all your mail.
Did you get that?
If your account is hacked you could loose all your email if the only copy is Cloud based.

FIX: (Only Apple Mail covered although the same technique can be used by most email applications)

Assuming you have Apple Mail setup with your Cloud based accounts.
Launch Apple Mail.
In the Menu at the top of the screen use the Mailbox Menu and select New Mailbox. New Mailbox option is ½ way down this list.
See Pic below:

A new floating window will appear.

See Pic below:







Ensure that the Location says On My Mac. You might have to click on the drop down menu to select On My Mac if it is not already selected.

Type in your new mailbox name and click OK.

You will see your new mailbox appear in the left column of Apple Mail.

See Pic below:









You can now HOLD DOWN THE ALT KEY and click and drag from your Cloud based mail accounts into this folder structure.

This makes a copy of the dragged mail locally On Your Mac ☺

Mail stored in the On My Mac section of Apple mail cannot be deleted if your online mail accounts are hacked.

You should have a Time Machine backup of your Mac. As your mail is now filed On Your Mac, it will be part of the Time Machine backup.


Why are mobile device charging cables so short?

mobileMobile devices are not meant to be used for voice calls while the device is charging.

TRUE: The horror pics circulating the Internet of phones exploding is a hoax.

This does not mean these devices are safe to hold to your head while they are being charged. All the tests and working procedures are done when the phone has sufficient charge and is not plugged into the power outlet. Using the device in this manner is therefor not what the manufacturer had in mind.



DSTV on your iPad

DSTVSky TV in the UK has had this feature forever but it is great news that DSTV in South Africa has also made this amazing feature available.

You can now play DSTV OnDemand programs on your iPad.

It’s easy to setup and actually works perfectly well on a 4mb/sec MWEB ADSL line. All you need to do is register on the DSTV website.
After the registration you will be sent an email. Following the basic instructions on the email DSTV send you, you will link your DSTV smart card number to this account. I would safely assume that this is how the application will determine what shows are available to you in the OnDemand section of the iOS application.

The DSTV application is available FREE from the South African App store. Once you have downloaded this on your iPad and logged in using your newly created account a new world of magic opens up to you.

But wait there is MORE:

The DSTV OnDemand selection on the iPad is much bigger than on your DSTV decoder’s OnDemand section. I was very pleasantly surprised to see a host of series and movies on the iPad OnDemand section that are not available when you check your DSTV decoder. The other killer feature is that every series lists its previous episodes. This makes it so easy and convenient to watch a couple of episodes in a series one after the other without having to hunt around. Given that without the ubiquitous adverts a series episode can easily finish within 35 minutes compared to the full 1 hour with adverts, this is a very tempting activity on a rainy Sunday afternoon.

Multiple people can log into the DSTV app with the same account information. This will facilitate you, the wife and all the kids to have access to the series and movies on their individual iPads. GO ON admit: everyone in the family DOES have their OWN iPad.

Thank you DSTV.

You might have retained me as a client due to this breakthrough facility.


Do you have a secure backup of your website?

hackerIf the answer is no you stand a very real chance of losing all of it completely. We live in a time that hackers abound. Their motives for creating havoc on your site is often not clear. You should be aware that to be recognised as a “hacker” you have to be rated. To obtain said rating the padawan hacker has to hack a website leaving their hacker handle as proof of their dirty work.

This explains a reason behind their intent. There’s obviously a million other reasons why your site could be targeted. No matter what precautions you might have taken or how up to date you keep your website, YOUR WEBSITE CAN BE HACKED.

This is where a secure full backup of the site is essential. The auto backups provided by many ISP is not sufficient. You need a backup plan of your own.

If you have an old style static HTML website a simple copy of all the files will suffice.

Add ons have made it really easy with websites created in WordPress or Joomla. These add ons make backup a simple one click procedure. Critically the add ons automate the complex task of not only backing up the myriad of files but also backup the underlying databases.


In app purchases

iapThe current trend is that apps are free to download and use but the developers build in “in app purchases.” These are also referred to as micro transactions. It’s not a bad practise or done with any malicious intent. It rewards the developers with some money to continue their endeavours.

For example: you could download a basic drawing program and then opt to purchase additional pen types or additional colours.

The problems arise when the ipad is handed over to our little darlings. (Kids) The games they download with or without our consent mostly have these in app purchases. To make matters worse there is often confusion between rewards earned within the game and those that will be billed to your credit card. Remember your ipad is connected with your iCloud account which has your credit card details. To authorise a purchase from within an game or app it’s often as easy as clicking on the OK option provided. BOOM money has been deducted from your credit card.

All parents can take steps to avoid such a fate: If you have an iPhone or iPad, go into Settings, then into General, then Restrictions. Enable restrictions (you’ll have to create a PIN so Timmy can’t undo your handiwork) and then turn off  In-App Purchases under the Allowed Content heading. You can also adjust further parameters, such as whether your kids can have access to iTunes, the camera, or the Safari Web browser.


Who should you connect to on LinkedIn?

LinkedIn connectYour LinkedIn success depends a lot on who you are connected to.  Many professionals on LinkedIn misunderstand this and believe that you should be connected to as many people as you can convince to accept your connections. This could not be further from the truth.

This is what LinkedIn says about it:

Connecting to someone on LinkedIn implies that you know them well:

  • They’ll have access to people you know
  • Others may ask you about them and vice versa
  • You’ll get updates on their activity

LinkedIn lets you invite colleagues, classmates, friends and business partners without entering their email addresses.

However, recipients can indicate that they don’t know you. If they do, you’ll be asked to enter an email address with each future invitation.

Here are a few reasons why you should only connect to those you KNOW, TRUST and CAN RECOMMEND:

  1. When you request a connection with someone you found through a name search on LinkedIn, you are asked how you know this person – colleague, classmate, business partner, friend, group/association or other.  Choosing friend or other will require the person’s email address before requesting the connection – again, to ensure you know the person. Most people lie through their teeth here just to make a connection with someone they usually don’t know from a bar of soap.  The reason LinkedIn asks is because it matters that you actually know the people you are connected to.
  2. I’m often surprised at how I am connected to nearly every professional person in my city or industry because we know someone in common.  If I see one of my connections is connected to someone I want to do business with, I can ask my connection to introduce us.  This is a very powerful feature as it gives credibility to both parties – like a real introduction by someone you know and trust to someone they know and trust.
  3. You can only get/give recommendations from/to your connections.  The same counts for endorsements.  Those you connect to who don’t actually know you will happily give you endorsements for anything – even though they have no idea if you actually have these skills.  This causes the whole endorsement feature to be worth less than the space it takes up on a profile.
  4. You see the activity of your connections in your Timeline (LinkedIn Home) and on the Signal page – if you know and trust all your connections, these updates are really interesting, keeping those who know and trust each other in business updated with each other’s professional lives.  If not, well, it’ll just be noise.
  5.  You don’t have to be connected to someone to network with them.  Networking is done via Groups and introductions.  Find a Group you are interested in, take part in discussions and you will get to know many professionals you are not connected to.  This could even lead to new connections!

I hope this helps clear up some of the confusion around the connection issue on LinkedIn.  Please help me spread the word – if your real connections are connected to people they don’t know, it will water down your networking experience on LinkedIn too!

Do YOU connect to people you don’t know on LinkedIn, and why?


iLove Airport Express


Back of Airport Express

Airport Express I love you!

You owe yourself an Airport Express!

What an elegant device that solves a multitude of problems.

  • Add a WIFI hotspot

This clever little device can add an additional WIFI hotspot in your house or office.

Lead an Ethernet cable from your existing ADSL Router and plug into the back of the Airport.
BOOM you have a fast and strong 802.11n wifi hotspot.

  •  Make most USB printers WIFI

Plug your USB printer into the back of the Airport Express.
BOOM your non WIFI USB printer is now available via WIFI from Mac and PC computers.


Plug a lead from your HiFi into the back of the Airport Express.
You can play your music collection from any Mac or iDevice wireless and blast it through your HiFi.


Scammers & Spammers

We have all seemingly adapted to email spam. We set spam filters to auto move the identified spammer into a junk mail box. The spam still arrives at your computer thus the Scammers & Spammersbandwidth is used. On an ADSL account we don’t notice it but if we are using 3G receiving spam is an unnecessary expense.

Spam could merely be some unsolicited mail trying to sell you something or it could be a more serious attempt to scam money from you. It’s so bad that I assume all mail from any bank to be a scam.

Email scam and spam is not the focus of this article. Scam and spam sent to your mobile phone via SMS is the focus here.

While we can all agree that it’s unlikely we will ever eliminate this practice it is interesting to see where the money goes.

In the world of SMS scammers & spammers WASP services is the way to go.

It’s a simple matter of registering with Vodacom and becoming a WASP service provider. You can now send bulk sms’s to millions of mobile phone subscribers using a database of dubiously obtained mobile numbers. More importantly you can charge a premium rate even for simply sending the SMS.

There is an infinite number of angles to spin a SMS scam. To be safe assume all SMSes that are not from a known contact to be trouble.

Here’s a simple scam that has been pulled on many people:

  • You get an SMS telling you that you have won a prize of Rxxxxxx million. They list a mobile number for you to call to claim your prize.
  • You have not won anything but when you call the number given in the SMS the operator although  super friendly is not super efficient. You are put on hold for ages, asked irrelevant questions and it is clear that you wasting time here.
  • Not all premium rated numbers have to have a special prefix, they can appear as totally normal numbers.
  • You might be wasting your time but the scammer is making money! The number you dialled is a premium rated number and you could be charged any amount per second of the call.

It’s only clear that you have been scammed when your monthly Vodacom bill arrives and you see the extra charges for “premium rated services.”

This is where is becomes really interesting. Remember the money trail!

Vodacom benefits the most from all money made in this type of scam. They get 70% of the amount charged to you. The WASP provider and the registered “premium content provider” gets a mere 30%

It seems obvious to all that a crime has been committed by illicitly extorting funds from you. However, the burden of proof is now yours.

It seems unbelievable that a company as big as Vodacom can get away with this type of crime. The reality is that they do!



Get every new post delivered to your Inbox

Join other followers