TidBITS#725/05-Apr-04
=====================
Is your wireless network secure? The better question is: how can
you evaluate the level of security you should implement? Adam
weighs in with his Three L's of security. While you're thinking
ahead, Jeff Carlson explains things to consider when buying a
laptop bag. Also, we announce the winner of last issue's DealBITS
drawing for an autographed can of Spam, and note the releases of
Security Update 2004-04-05, Retrospect 6.0.193, LaunchBar 3.3 and
4.0b1, and Panorama V 4.9.6.
Topics:
MailBITS/05-Apr-04
Evaluating Wireless Security Needs: The Three L's
Buying a Laptop Bag
Hot Topics in TidBITS Talk/05-Apr-04
<http://www.tidbits.com/tb-issues/TidBITS-725.html>
<ftp://ftp.tidbits.com/issues/2004/TidBITS#725_05-Apr-04.etx>
Copyright 2004 TidBITS: Reuse governed by Creative Commons license
<http://www.tidbits.com/terms/> Contact: <[EMAIL PROTECTED]>
---------------------------------------------------------------
This issue of TidBITS sponsored in part by:
* Make friends and influence people by sponsoring TidBITS!
Put your company and products in front of tens of thousands of
savvy, committed Macintosh users who actually buy stuff.
For more information and rates, email <[EMAIL PROTECTED]>.
* READERS LIKE YOU! Help keep TidBITS great via our voluntary <------ NEW!
contribution program. Special thanks this week to Alpha Walker,
John Gebhart, and Andrew Laurence for their generous support!
<http://www.tidbits.com/about/support/contributors.html>
* SMALL DOG ELECTRONICS: iMac Sale! <-------------------------------- NEW!
iMac G4/1.25 GHz 20" SuperDrive Only $1949! iMac G4/1GHz 17"
SuperDrive Only $1545! iMac G4/1GHz 15" Combo drive Only $1095!
Visit: <http://www.smalldog.com/tb/> 802-496-7171
* FETCH SOFTWORKS: Is maintaining your Web site tedious? Use <------- NEW!
Fetch, the original Macintosh FTP client, and you can record
AppleScripts that automate repetitive uploads and downloads.
Get Fetch now at <http://fetchsoftworks.com/>!
* Dr. Bott, LLC: We got into this business because we love
computer stuff. We now have the chance - the DUTY - to sit and
geek out with technology every day under the guise of "work."
And if it's cool enough, we sell it. <http://www.drbott.com/>
* Web Crossing: Free _Web Crossing Express_ now adds discussions & <- NEW!
plug-ins (low-volume) to the unlimited Web/FTP/email server.
Plug-ins add blogs, wikis, RSS, & more. Perfect for small biz,
families or clubs. Try it! <http://www.webcrossing.com/tb-304>
---------------------------------------------------------------
MailBITS/05-Apr-04
------------------
**Security Update 2004-04-05 Released** -- Apple posted two
versions of Security Update 2004-04-05 for Mac OS X today.
The update for Mac OS X 10.3.3 Panther replaces the Mail, OpenSSL,
libxml2, and CUPS Printing components and is a 3.7 MB download.
The update for Mac OS X 10.2.8 Jaguar includes only the CUPS
Printing update, but also incorporates Security Update 2004-01-26
and is a 4.8 MB download. No other details were released; the
updates are available from Software Update or as standalone
downloads. [JLC]
<http://www.apple.com/support/downloads/
securityupdate_2004-04-05_(10_3_3).html>
<http://www.apple.com/support/downloads/
securityupdate_2004-04-05_(10_2_.html>
<http://db.tidbits.com/getbits.acgi?tbart=07525>
**Retrospect 6.0.193 Released** -- Dantz Development has released
Retrospect 6.0.193, a minor update to the company's powerful
backup program (see "Dantz Ships Panther-Compatible Retrospect
6.0" in TidBITS-714_). Retrospect 6.0.193 is designed to address
a number of annoying bugs and incompatibilities. It features a
workaround for a change in Mac OS X 10.3.3 that prevented tape
autoloaders and fibre channel tape libraries from working, and
offers better performance for duplicates and restores during the
Closing phase. This version also works better with pre-6.0 backup
sets: freezes and errors when accessing pre-6.0 backup sets have
been addressed; it now allows New Media backups to pre-6.0 backup
sets; and you can now restore data from pre-6.0 Internet backup
sets. Also important is the included Retrospect Driver Update
5.2.101, which solves crashes when backing up to VXA and DAT
drives, fixes a problem with the magazine being ejected from a
desktop autoloader after cleaning, and eliminates a crashing bug
that could occur during device scanning if more than 2 GB of RAM
was installed. Retrospect 6.0.193 is a free update to registered
users of Retrospect 6.0; it's a 23.8 MB download. [ACE]
<http://www.dantz.com/>
<http://db.tidbits.com/getbits.acgi?tbart=07515>
<http://www.dantz.com/en/support/60193_note.dtml>
**LaunchBar 3.3 and 4.0b1 Released** -- Objective Development last
week released both LaunchBar 3.3, the latest version of their
slick keyboard-based application launcher, and LaunchBar 4.0b1,
a public beta of the next major version (see "Tools We Use:
LaunchBar" in TidBITS-671_). LaunchBar 3.3 distinguishes itself
by scanning address books for phone numbers, which are displayed
in large type when accessed via LaunchBar. Most of the other
changes are relatively minor, though undoubtedly welcome to
specific users (for instance, you no longer need to press
Command to move the LaunchBar window, and Unix aficionados
can now navigate the search results list with Emacs key bindings).
It's a 269K download and is free to registered users; new copies
cost $20 for home use or $40 for business use.
<http://db.tidbits.com/getbits.acgi?tbart=07107>
<http://www.obdev.at/products/launchbar/releasenotes.html>
LaunchBar 4.0b1, though, brings major features to the application,
including a new configuration interface, a multithreaded indexing
engine that scans in the background, new scanners dedicated to
specific types of data (such as music in iTunes, pictures in
iPhoto, Web browser history, Watson tools, Sherlock channels,
and more), built-in Web searching, an Open With command, access
to recent documents for any application, and execution of
AppleScript scripts and Unix executables. It's a beta, so if
you're not willing to take the usual precautions, stick with
version 3.3. It's a 450K download. [ACE]
<http://www.obdev.at/products/launchbar/index4.html>
**Panorama V 4.9.6 Released** -- Back in September 2003, we noted
in TidBITS-697_ that ProVUE Development had released a public
preview version of Panorama, their long-standing database program.
Although Panorama V retains its preview status, it's working well
in Mac OS X and ProVUE continues to add features quietly while
moving toward a major release. New in the just-released Panorama
4.9.6 is a feature called Channels that links data in Panorama to
the outside world in abstracted ways, initially via dialing the
phone and sending email; a Channel Workshop wizard helps develop
new channels. Another new feature, "generic fields," helps you
link Panorama databases with similar information, and to link a
database with external software such as Mac OS X's Address Book.
More minor improvements include scroll wheel support, additional
options for elements like checkboxes and radio buttons, support
for building AppleScript scripts on the fly, and the capability
to run procedures in the background. The upgrade is free to
registered users of the preview version; anyone who wants to
give Panorama V a spin can download the 7.4 MB file and use it
with up to 250 records. [ACE]
<http://db.tidbits.com/getbits.acgi?tbart=07351>
<http://www.provue.com/Documents/PanoramaV/Introduction.html>
<http://www.provue.com/Documents/PanoramaV/ReleaseNotes.html>
<http://www.provue.com/Documents/PanoramaV/BugFixes496.txt>
<http://www.provue.com/Downloads/Panorama5Download.html>
**DealBITS Drawing: Autographed Spam Winner** -- Although we had
only 257 entries in our one-day DealBITS drawing for an
autographed can of actual Spam, as announced in last Thursday's
extracurricular issue, the competition for that can was hot and
heavy, with a number of people begging for special dispensation.
But such shenanigans would be against our carefully amended rules,
which made for tasty reading, so I'm pleased to congratulate
Guy Plunkett III of charter.net, whose entry was chosen randomly
and who will be receiving a can of Spam, autographed by me.
It's worth $2.95 in raw materials, although I wouldn't be
surprised if Guy could get $4 or even $5 if he were to auction
it on eBay. Unfortunately, our deal with Hormel to provide a
discount on Spam by the case fell through, so if you're hankering
for some Spam Quesadillas, Spamghetti and Spamballs, or other
delicious Spam treats (or even if you just want to break into
the cutthroat world of Spam architecture), you'll have to ante
up full price on your own. Many thanks to those who entered this
special DealBITS drawing, and for those who either didn't win
or failed to enter because you thought we were kidding, I hope
the devastating disappointment you're undoubtedly experiencing
won't prevent you from participating in the future. Who knows,
maybe this time next year I'll give away a can of Turkey Spam.
[ACE]
<http://www.tidbits.com/dealbits/AdamSpam.html>
<http://db.tidbits.com/getbits.acgi?tbart=07614>
Evaluating Wireless Security Needs: The Three L's
-------------------------------------------------
by Adam C. Engst <[EMAIL PROTECTED]>
Crackers, worms, viruses, zombies, trojans... it seems as though
the promise of constant access and instantaneous communication
through networking has been twisted in such a way that people
are afraid in ways that few expected back in less-connected days.
In large part because of co-authoring The Wireless Networking
Starter Kit with Glenn Fleishman, many of the interviews I do
end up working their way around to security, which I find somewhat
depressing. For me, wireless networking is all about breaking down
barriers - physical barriers - and I'm more interested in sharing
connectivity than erecting virtual barriers.
Nonetheless, there are very real situations in which security -
often serious security - is called for, and in trying to help
people decide if they need it, I've come up with what I call
the three L's of security: Likelihood, Liability, and Lost
Opportunity. This article will help you think about security in
general and wireless security in particular; to learn more about
how to address wireless security concerns, Glenn and I wrote four
chapters on the topic in The Wireless Networking Starter Kit,
Second Edition, available in both paper and electronic form.
<http://wireless-starter-kit.com/>
**Likelihood** -- The first aspect of security to consider is
likelihood: how likely is that someone will violate your privacy,
steal your belongings, or otherwise exploit you? For instance,
when I was growing up in rural New York State in the early 1980s,
my family lived on top of a hill in the middle of roughly nowhere.
Our nearest neighbors were a mile away, the dirt road that went by
our house seldom saw an unrecognized car, and the road wasn't even
plowed past our house in the winter. As a result, I left the keys
to my car (a rusty Dodge Colt that needed bits of mouse nest
cleaned from its fuel filter on a regular basis) in the ignition
when it was parked in the driveway. It was easier than bothering
to bring the keys inside, and when I evaluated the likelihood
that anyone would steal the car, I just couldn't see it happening.
Fast forward ten years to when Tonya and I were living in a
populous suburb of Seattle. Our car was a shiny red Honda Civic,
we barely knew the next-door neighbors, much less everyone on the
street, and unknown vehicles zipped by day and night. We did _not_
leave the keys in the car when it sat in our driveway; we locked
the doors at all times, and we had a lock that connected the
brake pedal to the steering wheel for when we parked in seedier
neighborhoods in downtown Seattle. The change in location and
situation affected our perception of the likelihood of someone
stealing the car, and we responded in kind.
I like to use the car analogy because I think people understand it
on a visceral level; a beater car in the country is of course much
less likely to be stolen than a new car in the suburbs. But the
lesson applies equally well to wireless networks. Your location is
important, as is the type of data that passes across your network.
If you live in a lightly populated area, and no one could easily
come within range of your network without sitting in your
driveway, you probably don't have much to worry about. Turning
on WEP or WPA and dealing with the passwords is probably more
trouble than it's worth. That's especially true if your network
is just a standard home network that you use for browsing the
Web, checking email, and moving files around. But if you live
in an apartment building with neighbors who could pick up your
connection, the likelihood of someone connecting to your network
rises significantly, generating the question of whether you want
to allow others to share your Internet connection or not. Even
apartment dwellers aren't likely to have "interesting" (to a
thief) data on their network, so there's little incentive for
someone to do more than use the Internet connection.
The likelihood of attack increases significantly if you're running
a business, since it's plausible that your network would carry
sensitive information such as credit card numbers, business plans,
and so on. Also, most businesses are located in areas or buildings
where someone could easily sit and hack into your network without
being noticed.
**Liability** -- Think about the car analogy again. What was the
liability if someone were to steal my rusty Dodge Colt? It was
probably worth a few hundred dollars at the time, and although
that amount of money meant more to me than it would later, it
still didn't compare to the thousands of dollars embodied in the
new Honda Civic. Again, with physical property, the liability of
loss is fairly obvious. You might not think twice about leaving
an old 3-speed bicycle on your front porch, but you'd be much
less likely to leave a 21-speed racing bike out there without
a strong lock.
Now transfer that kind of thinking to your wireless network.
What is the realistic liability if someone were to record all the
traffic that passed across your wireless network? For most home
networks, the amount of network data that's at all sensitive
is extremely low; perhaps a credit card number being sent to a
unusual Web site that doesn't use SSL, maybe some financial data,
possibly some bits that would be embarrassing if made public.
(It's worth noting that although you should also apply this
consideration of likelihood, liability, and lost opportunity
to the data on your hard disk, a wireless network is only one
way someone could access your stored data. An always-on Internet
connection could provide an avenue for attack, and physical theft
would also give a burglar access to your files. Of course, if
you're using Windows system, even with all the patches applied,
firewalls, and anti-virus tools, you may need to take stronger
measures than when using a Mac running Mac OS 9 or Mac OS X.)
Simply allowing someone else to use your Internet connection has
a relatively low liability in most cases. However, you may think
differently if you pay per byte, if you have a slow dialup
connection that would be impacted by someone else's use (with high
speed DSL and cable modem connections, you're unlikely to notice
another user), or if you're concerned that allowing someone else
to use your connection would be violating your ISP's terms of
service in a way that was likely to result in you being
disconnected.
Business are once again a different story. The likelihood
of sensitive and confidential information passing through a
wireless network is much higher, of course, and the liability
of an outsider learning that information is significantly
greater. If a business's customer data were extracted from
a wireless network, it could involve a disastrous loss of
reputation or even lawsuits. And if confidential business
plans were learned by a competitor, the ramifications could
be catastrophic.
**Lost Opportunity** -- This last security consideration was
suggested by my friend Oliver Habicht, an IT director at Cornell
University Library. Oliver pointed out, rightfully enough, that
the opportunity cost of implementing and living with security
measures also has to be factored into the equation. To return to
the car analogy, you can buy car alarms and security systems, but
they're expensive and a hassle to use on a regular basis. A car
alarm would have been wasted on my elderly Dodge Colt, and it was
overkill even for the Honda Civic. Had we owned a Ferrari, though,
I would have considered a security system mandatory, and even with
our Civic, if petty theft was common, the security system might
have been worth it. Put another way, you can expend significant
time and money to ensure a high level of security, but would your
effort and expense have been better employed elsewhere?
With home wireless networks, the opportunity cost comes mostly
in the form of troubleshooting irritating problems, which is more
necessary and harder when security is on, and in the annoyance
of dealing with passwords with new machines or when you have
visitors. In a corporate environment, you have both the extra
work of dealing with the security measures and the extra expense
of authentication servers, VPN hardware, and so on. But since
your data is so much more valuable in a business environment,
the expenses are more easily justified... to a point (armed
guards with attack dogs patrolling your parking lot may be an
excessive reaction to the possibility of someone sitting in
a car within range of your wireless network, for instance).
**Your Spot in the Security Spectrum** -- I hope I've made it
clear that there are no cut-and-dried answers when it comes
to security. It's up to you to determine the likelihood of
someone breaking into your network and either using your Internet
connection or eavesdropping on the data that flies by. Next, you
must determine the severity of the problems that would ensue from
someone using your bandwidth or using a network sniffer to record
your data. Lastly, you need to figure out what the lost
opportunity of different levels of security is: the higher the
likelihood of attack and the higher the liability if your network
were to be invaded, the more you're probably willing to spend
and the more annoyance you're willing to endure. Only by seeing
where your situation fits for likelihood, liability, and lost
opportunity can you ascertain how much effort you should expend
on security.
Buying a Laptop Bag
-------------------
by Jeff Carlson <[EMAIL PROTECTED]>
Unlike buying a desktop Mac, purchasing a PowerBook or iBook often
means purchasing a bag of some sort to carry it in. But buying a
laptop bag can involve as much, if not more, consideration than
buying the computer itself. What sort of cushioning will protect
your investment? How much should the bag carry? How often will you
be carrying it? And what other features should you look for?
For this article, I originally wanted to review a few specific
bags, but because there are so many types of bags and ways that
people use them, I'm going to take a broader approach instead and
look at some of the factors you should consider when buying this
essential laptop accessory.
**Types of Bags** -- In general, you can find four types of
laptop bags. For the traditional business look, you can opt
for a briefcase shape that sports one handle and possibly a
shoulder strap. Briefcase bags range from slim slabs of leather
to bulky expandable contraptions that offer more concealed pockets
than you may ever need. The largest of the briefcase-style bags
even feature wheels and handles for pulling through airports.
(As far as I know, none yet feature their own motors, but never
say never!)
Bike messenger-style bags tend to be larger than briefcases, with
a strap that goes over one shoulder and across the chest. A second
strap that connects to the main strap is sometimes included to
improve stability (such as when riding a bike, naturally). Some
messenger bags consist of just one large pocket where you store
everything, laptop included, but you can also buy modified
messenger bags that include padded compartments for laptops
and accessories.
Backpacks are also popular, especially among students and
travelers who prefer to keep their hands free when carrying their
gear. Like briefcases, you can find backpacks that hold little
more than the laptop and its power cord, as well as beefier models
with enough room for your accessories, a few changes of clothes,
and maybe even a very small consultant.
For the minimalist, laptop sleeves have begun to gain popularity.
Sleeves hold only the laptop itself, sometimes also including
an outside pocket for a few sheets of paper or a couple of CDs,
though not a power adapter and cord. Sleeves are often used in
conjunction with other bags (of all sorts, not just computer bags)
to further protect the laptop.
That said, hybrids and variations abound - some bags can be
carried like a briefcase, slung over the shoulder like a messenger
bag, and also include straps you can extract to carry the bag like
a backpack. The specific type of bag is usually a personal choice
based on your likely usage patterns; I own two bags I use
regularly: a Timbuk2 messenger bag for when I ride my bicycle
to work and a Tom Bihn Brain Bag backpack for when I'm traveling
or need to carry more than my minimal complement of gear.
<http://www.timbuk2.com/tb2/catalog/categories.t2?categoryId=1>
<http://www.tombihn.com/page/001/PROD/100/TB0104>
**Essential Advice** -- No matter which bag style you choose, keep
the following factors in mind while you're shopping.
Weight is extremely important. My 15-inch PowerBook G4 is pretty
svelte at 5.6 pounds (2.5 kg), but I also carry an extra power
adapter, an assortment of cables, Palm organizer, iPod, and other
stuff that adds up - I don't need more weight added by the bag
itself. Although a rich leather exterior looks sharp, I prefer
to carry something made of lighter materials.
Speaking of materials, other than leather you'll commonly find
bags made of materials such as ballistic nylon and Cordura (a
durable fabric manufactured by DuPont). They're resistant to tears
and scuffs and provide some level of water-resistance - though
be wary of companies claiming their bags as being "waterproof."
Cordura or nylon alone won't keep the liquid out over time, and
zippers and seams are often not properly sealed or treated to keep
moisture out. If you really need a waterproof bag (if, say, you
bike to work in Seattle every day throughout the year), look into
getting a dry bag with a roll-down opening, such as those made
by Ortlieb. For the ultimate in rough knocks durability, look
for something like Matias Corporation's Laptop Armor case, which
has a hard outer shell and a padded foam interior.
<http://www.cordura.com/>
<http://www.ortlieb.com/>
<http://halfkeyboard.com/laptoparmor/>
Also consider the bag's appearance - not just its color or how
fashionably it's cut, but whether the bag is appealing to thieves.
Too many bags scream, "Laptop inside!" and make for good targets.
(TidBITS contributor Gideon Greenspan took the idea of concealment
to one extreme when he embarked on a trip through Asia with his
PowerBook sheathed in a padded FedEx box; see "Off the Beaten
Track" in TidBITS-508_.) Backpacks are good because they can
just as easily hold textbooks or papers, and may not be worth
a criminal's attempt.
<http://db.tidbits.com/getbits.acgi?tbser=1162>
The next consideration is access: can you grab your laptop with
one hand? Are the buckles, clips, or straps easy to fasten and
release (and can those be done with one hand)? Can you get to the
laptop without taking the bag off your back or shoulder? This is
especially important if you're a frequent air traveler, because
you need to extract your laptop as you're going through airport
security (at least in the United States; I haven't had the
pleasure of visiting another country lately with my computer
gear). For this reason I like a bag with convenient access from
the top. In contrast, I actively avoid briefcase-style cases that
require you to unzip most of the bag, then undo a pair of Velcro
straps which anchor the computer into place. That approach might
hold the PowerBook more snugly, but it's simply too much work.
And, of course, perhaps the most important factor is a bag that
will protect your laptop from the inevitable indignities that
accompany everyday use.
**Damage Control** -- Although a bag gives you a better way to
carry your laptop than tucked under your arm, it should also offer
protection from bumps, jostles, and environmental nasties. Just
how much depends on your comfort level.
At the least, the bag should have some sort of padded pocket for
the laptop. If it doesn't, such as with a single-pocket messenger
bag design, get a padded sleeve that holds the computer. Even
better are bags or sleeves that incorporate some sort of air
cushion in addition to padded material. For example, the Tom Bihn
Brain Cell sleeve that I use suspends my PowerBook in a sling -
if I accidentally drop my bag a couple of inches, the laptop may
not even hit the ground.
<http://www.tombihn.com/page/001/PROD/TBP/TB0300>
Just as important, however, is protection from accidental
spills and other mishaps. A problem with many bags is that their
architecture doesn't provide support for keeping them upright.
The weight of a computer and related gear causes the bag to tip
over and disgorge its contents. This may not be a big deal when
you're sitting on the floor at the airport waiting for a flight,
but if you set the bag on a table and it tips the wrong way,
that three-foot drop could cause serious damage.
The construction extends to zippers and clips, too. A friend of
ours lost his PowerBook because the zipper on his bag slid loose
and the laptop (with some help from gravity) pushed itself out
into the open air. We've seen bags with zippers that extend almost
the entire way around the bag, which seems like a nice idea for
full access, but it also makes certain types of accidents far
more likely if the zippers aren't closed properly.
**Store, Organize, Access** -- With the basics of protection out
of the way, make sure the bag will hold the other gear that's
bound to tag along, and make it easily available. Cables are
notorious space-wasters, so look into buying a separate carrying
case for them; heavy-duty ziplock bags also work. Nearly all bags
come with some type of pockets for pens and pencils to help
prevent ink exploding in the bag.
Specialized pockets are also a bonus. Adam has used a Kensington
SaddleBag for years, not just because it holds his PowerBook
snugly and includes hidden backpack straps for traipsing around
New York City during Macworld Expos, but because it includes
a clever pocket on the outside flap that's exactly the right
size for stowing airline boarding passes or folded-up maps.
(The SaddleBag Pro, which I haven't used, also includes a
Junk-It drawer - a plastic slide-out tray at the bottom where
you can store cables and other small miscellaneous items.) One
unusual pocket you might appreciate is an external water bottle
pocket; being forced to carry a water bottle inside the bag
with his laptop and other gear always makes Adam nervous.
<http://www.kensington.com/html/2513.html>
<http://www.kensington.com/html/2226.html>
However, be careful of bags with too many pockets: in my
experience, more pockets invite you to carry more stuff, which
makes you need a bag with more pockets, until ultimately your idea
of a portable computer case is one with wheels that hitches to the
back of your car. It's more important to find a bag with just the
pockets you need, especially when the designer has put a great
deal of thought into size, placement, and accessibility.
**It's in the Bag** -- If at all possible, try to obtain some
hands-on time with the bags you're thinking about purchasing.
Computer-supply stores tend to have a moderate selection; Apple
retail stores carry a several brands and types; and travel and
luggage stores are good sources. A visit to Macworld Expo is also
an excellent way to compare bags from a number of manufacturers
in person. It's always worth asking your laptop-toting friends,
who can give you their hard-won advice on what to look for or
avoid in a particular case.
Whatever you choose, keep mind that the state of laptop bag design
is continually advancing, and you may find yourself wanting a new
bag in a few years anyway. Or you may need a new, larger bag to
hold Apple's forthcoming 20" PowerBook G5 (kidding!).
Hot Topics in TidBITS Talk/05-Apr-04
------------------------------------
by TidBITS Staff <[EMAIL PROTECTED]>
While we're waiting for the Web Crossing programmers to figure out
how to let us eliminate HTML formatting from messages in TidBITS
Talk, note that some of the messages in our existing archive are
a bit more difficult to read because of the HTML tags. You may wish
instead to read these threads in Web Crossing itself, where the
HTML formatting is handled behind the scenes. You can see all the
TidBITS Talk threads at the link below; the second link below each
thread description takes you directly to that thread in Web
Crossing. Although we've put absolutely no effort into making
the Web Crossing archive look the way we want yet (so no snarky
comments, please), you'll find that it's a lot faster than our
old archive.
<http://emperor.tidbits.com/TidBITS/Talk/>
**Tactile Pro Keyboard** -- Adam's review of the Matias Tactile
Pro Keyboard sparked a lot of comment (and reminiscences of truly
terrible keyboards of the past), demonstrating that Apple's mushy
offerings leave much to be desired. (40 messages)
<http://db.tidbits.com/getbits.acgi?tlkthrd=2200>
<http://emperor.tidbits.com/TidBITS/Talk/62>
**Fixing keyboards** -- On a related note, what are the best
techniques for cleaning and repairing keyboards? (6 messages)
<http://db.tidbits.com/getbits.acgi?tlkthrd=2202>
<http://emperor.tidbits.com/TidBITS/Talk/64>
**Setting up a Mac OS X VPN** -- Advice on setting up a virtual
private network under Mac OS X. (3 messages)
<http://db.tidbits.com/getbits.acgi?tlkthrd=2208>
<http://emperor.tidbits.com/TidBITS/Talk/70>
$$
Non-profit, non-commercial publications may reprint articles if
full credit is given. Others please contact us. We don't guarantee
accuracy of articles. Caveat lector. Publication, product, and
company names may be registered trademarks of their companies.
For information: how to subscribe, where to find back issues,
and more, see <http://www.tidbits.com/>. TidBITS ISSN 1090-7017.
Send comments and editorial submissions to: <[EMAIL PROTECTED]>
Back issues available at: <http://www.tidbits.com/tb-issues/>
And: <ftp://ftp.tidbits.com/issues/>
Full text searching available at: <http://www.tidbits.com/search/>
-------------------------------------------------------------------