Wow, seems like just yesterday I took down the old static page that was just a bunch of links I used to find stuff and went with a full-on WordPress site and published my first article. Doesn’t seem like I’ve been writing that long. But when I look at the over 2,500 posts on this site and the fact that I hit over 210,000 uniques last month, I guess it must be true. I’m so thankful that people want to read this stuff. And I’m really glad that I’ve been able to help a few people over the years. I hope the next 10 years are even better than the last 10! And thank you for coming back here and there, when you need to.
Oh, and Happy New Year!
krypted December 30th, 2014
When I put a computer in my daughters room, I soon realized I could no longer watch over her shoulder as she worked away at school games, Minecraft and of course Civilization (after all, that was my first game). So much as I wrote an article a long time ago about child-proofing an iPad, now I’m writing about child-proofing a Mac.
For me, I find that child-proofing is a bit like taking my kid to McDonald’s. I said never ever ever ever would I do this and then… Well, peer pressure, ya’ll… So if I have to do it, I figure someone else might. So here’s a quick and dirty guide to doing so. The gist of this guide is to continue using the same admin account that was created when you setup the computer initially. But to also create another account for the child, one that has some restrictions to keep them in a customized user experience. This might be to keep them out of things they try to do on purpose, keep them from accidentally finding some things they shouldn’t or maybe just to customize the user experience to make the computer easier to use (after all, if they can’t remove Minecraft from the Dock, they can’t come crying when they can’t find it.
Most of the work that needs to be done, can be done within the System Preferences. This is available under the Apple menu as System Preferences…
Once open, click on the Users & Groups System Preference.
At the Users & Groups System Preference pane, click on the plus sign (+).
At the new account screen, choose “Managed with Parental Controls” in the New Account field. Then provide the child’s name in the Full Name field and an Account Name will be automatically created (note that I shortened the name in this example to make it easier for the child to log in).
Assuming your child doesn’t have their own iCloud account, set the password to “Use separate password” and then type it in. Once you’re happy with these settings, create the new account, which can be managed with Parental Controls by clicking on the Create User button.
Once the account is created, click on the “Enable parental controls” checkbox and then on the Open Parental Controls… button.
At the Parental Controls System Preference pane, you’ll have a few options.
Next, click on the Web tab. Here, you’ll effectively have 3 options: don’t restrict any content, let Apple try and block inappropriate content and build a whitelist of allowed content (with all other content blocked). Now, it’s worth mentioning that there can be an annoying element here, which is that if a site needs to be opened up for access, a child might come bugging you. But I like that, so I’m configuring this.
Note: It’s worth mentioning that I discovered a few websites I’d of never tried to use in the allow list, so worth checking them out to see if your child will dig on some of these sites!
Once you’re satisfied with the options you’ve configured, click on the People tab.
At the People screen, you can configure who the person using the Managed Account can communicate with. Here, restrict access to Game Center, restrict who the account can send and receive mail with and of course, who the account can use the Messages app with.
The above options include the following:
Note: Apple rarely uses the word restrict. Instead, they prefer to allow things to happen by default and then let you disallow these features. Basically the same thing, but keep this in mind when you’re configuring accounts as sometimes you can accidentally click the wrong thing if you’re not accustomed to such double-negativery.
Once you have configured who the user of this account can communicate with, click on the Time Limits tab.
Time limits are used to restrict what times the user can use the computer as well as how long per day that the user can actually use the computer. The options available include:
Time limits are the only things that matter for some who like to physically sit with a child while they use a computer, as you might just want to keep the child from waking up in the middle of the night and accidentally seeing something that scares them. But for many, time limits won’t be enough, as kids might spend hours gaming or doing homework unmonitored.
Next, click the Other tab. Here, you’ve got the miscellaneous restrictions that really don’t fit anywhere else in Parental Controls. The options available include the following:
Note: I know I said earlier that Apple rarely says restrict or disable. They will get around to fixing this screen eventually… 😉
Once you have configured parental Controls, click on that Logs button in the lower right corner of the screen. Here, you’ll see the following:
And that’s what you can do with Parental Controls. But there’s more, which we’ll look at shortly. When you click out of a field, the settings are changed in a System Preference, so you should be able to just close the window and have your settings persist.
We’ve gone through creating a new account, restricting access to what that account can do and how and when to use these options. But there’s much, much more than we can cover in this article. There are tons of other restrictions that don’t fit into these basic options, accessed either through what are known as managed preferences or via profiles, which can easily be created by tools like Apple Configurator, Profile Manager and 3rd party mobile device management tools such as Bushel.
Ultimately, I can pretty much break out of about any managed environment you put me in. And in the age of YouTube, chances are that your child has many the same materials I’ve either presented, written or that others have written. So please don’t consider these options as much more than just a general guideline unless you’re using a Device Enrollment Program-enabled device.
Anyway, good luck, and you’re a good parent for caring.
krypted December 29th, 2014
krypted May 19th, 2014
Any time doing a migration of data from one IP to another where that data has a DNS record that points users towards the data, we need to keep the amount of time it takes to repoint the record to a minimum. To see the TTL of a given record, let’s run dig using +trace, +nocmd to turn off showing the version and query options, +noall to turn off display flags, +answer to still show the answer section of my reponse and most importantly for these purposes +ttlid to toggle showing the TTL on. Here, we’ll use these to lookup the TTL for the www.krypted.com A record:
dig +trace +nocmd +noall +answer +ttlid a www.krypted.com
The output follows the CNAME (as many a www record happen to be) to the A record and shows the TTL value (3600) for each:
www.krypted.com. 3600 IN CNAME krypted.com.
krypted.com. 3600 IN A 126.96.36.199
We can also lookup the MX using the same structure, just swapping out the a for an MX and the FQDN with just the domain name itself:
dig +trace +nocmd +noall +answer +ttlid mx krypted.com
The response is a similar output where
krypted.com. 3600 IN MX 0 smtp.secureserver.net.
krypted.com. 3600 IN MX 10 mailstore1.secureserver.net.
krypted January 23rd, 2014
Recently, I was working on some finance distribution issues. One of the things we decided to do was look at fund allocation from other environments through the lens of our deviation from industry standards. To make a long story short, we quickly realized that we needed to test for standard deviation and chose to use a chi-squared test, just like we were taught to do back in Stat 101. E is the expected frequency, O is a frequency and N is the number of cells.
krypted December 18th, 2013
Posted In: Consulting
Awhile back I did an interview with Amsys for their blog. If you’d like to see Part two of that interview (which outlines what weed does to computers amongst other things), check it out at http://www.amsys.co.uk/2013/blog/charles-edge-interview-part-2/#.UVw1Hb_JBlI.
krypted April 6th, 2013
MacTech Boot Camp is getting great reviews (90% of attendees recommend it). After selling out in a number of other cities, MacTech Boot Camps are coming to Los Angeles (July 27th at the LAX Sheraton Gateway) and Chicago (August 31st at the downtown Hotel Allegro). The Los Angeles event includes Ben Levy, Phil Goodman, Ric Wilson, Sean Colins, Chris Keller, Jonathan Goldhill, Scott Immerman, Sean Costello, Steve Favarger, Allen Hancock, and Peter Linde (there are some super great guys and some really good, experienced speakers in that bunch). While the early bird pricing for the LAX event has ended, you can use the following link to save $200: http://www.mactech.com/bootcamp/special-reg_Krypted
Geared towards consultants and technicians, MacTech Boot Camp is one track of awesomeness for those who support businesses, from the home office and small office to medium sized businesses. The content is great, as is the networking with other consultants. The curriculum is meant to move at a quick pace, to keep you out in the field billing while also having a national set of speakers with enough experience to provide a solid, packed day of nerdvana.
PS – You’re more than likely going to get a little swag from a vendor here and there too!
krypted July 11th, 2011
Posted In: Consulting
I’ve been watching the MacTech Conference and then Boot Camps for some time. After hearing of the resounding success of the Conference last summer I was then stoked to hear that the January Boot Camp went extremely well. A MacTech Boot Camp is a regional, single-track seminar designed specifically for consultants and techs. MacTech Conference is a multi-day conference for IT professionals with a focus on enterprise and development whereas the Boot Camps are for consultants and techs focused on home users and small to medium sized businesses. Both are going really well.
Krypted.com is now a media sponsor of MacTech Boot Camps! This means I get discounts to offer my readers! There is a Dallas Boot Camp coming up on April 27th and a Boston Boot Camp on May 18th. You can get a discount ($200 off) by signing up at http://www.mactech.com/bootcamp/special-reg_krypted. There is also one is Los Angeles on July 27th and one in Chicago on August 31st to round out the summer. You can get early bird pricing and a discount for those ($200 off) at http://www.mactech.com/bootcamp/special-reg_krypted.
There’s a lot of information covered in the Boot Camps, with each city hosting about 9 sessions of 45 minutes each. For a list of topics, see http://www.mactech.com/bootcamp/topics. The 2011 curriculum includes:
Certification testing is also available the day before the Boot Camps start through third party testing centers. This lets you get a lot of education out of the way at once (and at a discount) so you can focus on other stuff for the rest of the summer! For more on certification options: http://www.mactech.com/bootcamp/certification.
And let’s not forget that the second MacTech conference is going back to the Los Angeles area, from November 2nd through 4th at the Universal Sheraton! 3 days, meals included lots of very technical, enterprise oriented fun will be had by all!
krypted April 12th, 2011
This becomes interesting in that by using the AlphaNumeric script, users will actually likely have a better experience with your site since they won’t end up completing an entire form only to get an error, but rather get kept from providing invalid characters in a given field. AlphaNumeric is also clean and well written; love this script!
krypted January 2nd, 2010