Navigation

iBlindTech Democast

Wednesday
Sep212016

project starfish and the Blindfold Racer Championship 2016 - iBT 74

It’s time again to meet with the folk from Project Starfish. You can listen to prior episodes I’ve done with them here if you’re not familiar with them. We catch up about some of what has happened since last we spoke and introduce a new promotion they have running with Blind Fold Games to introduce the Blindfold Racer Championship 2016. Please visit Blind Fold Games for more information. Get yourself signed up as soon as possible as the championship starts on October 1.

Click here to play Episode 74

Sunday
Jul312016

Metering and Recording Audio with Amadeus Pro - iBT73 

This episode looks at how to record with the Mac app Amadeus Pro. I take a detailed look at the recording dialog and cover * How to pause and resume recording * How to adjust recording levels * how to accessibly meter the recording level to ensure the best possible recording * How to drop and name markers during recording for easy access when editing * How to listen or monitor what is being recorded Enjoy!

Click here to play Episode 73

Sunday
Jul032016

Star Reapers - iBT 72

A very different episode this time. I’ve recently undertaken the Audio Fundamentals course through The Cisco Academy for the Vision Impaired. I would highly recommend this course if you are at all interested in digital audio production. The course covers a range of topics from the basics of digital audio to working with the multi track digital audio workstation, Reaper.

While the course is taught on the Windows platform, as this is where Reaper is most accessible, Reaper is also available on the Mac. There is an Extension called OSARA which makes Reaper more accessible on both Windows and the Mac. Once again, the Windows version of the OSARA extension for Reaper, has had more development than the Mac version however it is certainly functional. Another extension for Reaper is SWS. Whilst the SWS extension doesn’t improve the accessibility of Reaper as such, it does improve the usability and functionality.

Thanks go to Joe DiNero, Lori Thompson and The Dark Kayaker for their assistance with my final project.

Click here to play Episode 72

Friday
Jun242016

Amadeus Pro Settings, Editing Audio on the Mac - iBT 71

I take a look at the settings for Amadeus Pro on this episode. Amadeus Pro, AP, is a DAW, or Digital Audio Workstation for the Mac and extremely accessible with Voice Over. This is the first in a series of podcast looking at various aspects of this application.

AP is a multi track editor that combines simplicity with a number of powerful features, including a batch processor and repair centre. My primary use of the app is in the production of these podcasts.

You can download a trial of AP here and check it out.

Click here to play Episode 71

Wednesday
Feb032016

Loopback, Accessible Cable Free Audio Routing for Your Mac - iBT 70

In this episode I introduce Rogue Amoeba's fantastic new software Loopback. It allows you to create virtual audio devices on your Mac, combining arbitrary audio sources. For example, you might want to create an audio device which combines the output of iTunes with the output of your mic, this virtual device can than be used as the audio input in applications like Skype. The app is fully accessible with VoiceOver, and a free trial version is available from Rogue Amoeba for download.

If you haven't already, please visit iTunes and subscribe to the show or use the RSS link at the top of the page.

Click here to play Episode 70

Sunday
Jan032016

PCalc: A Powerfull and Accessible Calculator App for iPhone & Apple Watch - iBT 69

This episode is a look at the iOS App PCalc. It is a wonderfully accessible, powerful and efficient calculator for your iOS device that not only presents a full featured app but also an interface in your notification centre and on the Apple Watch. The app store description of the full version is below, however a free lite version is also available. Try the free version from which you can update just the specific components you need, or grab the full version of the app.

App Store Description

PCalc is the powerful choice for scientists, engineers, students, programmers, or indeed anybody looking for a feature rich calculator. It includes an optional RPN mode and multi-line display, a choice of button layouts, an extensive set of unit conversions and constants, a paper tape, multiple undo and redo, engineering and scientific notation, as well as support for hexadecimal, octal, and binary calculations. Includes an Apple Watch app, so you can calculate on your wrist!

The developer James Thomson has done a fantastic job with the usability of the app and has also recently brought it to the Apple TV.

Subscribe in iTunes

Click here to play Episode 69

Sunday
Oct182015

Tripmode - iBT 68

Tripmode is a Mac app that allows you to control the data that your Mac uses whilst it’s connected to a mobile hotspot, or for that matter, any specific WiFi network. This episode takes a quick look at the app and discusses some of the benefits it will afford you.

Thanks go to Allison Sheridan of the Nosillacast Mac Podcast for highlighting the app, and bringing to my attention. Hope you enjoy the episode, and the app.

Click here to play Episode 68

Sunday
Oct042015

LetterPad - iBT 67

LetterPad is a free and accessible iOS word game that offers an Apple Watch app.

App Store Description

LetterPad gives you 9 letters. Your task? Find the hidden words relating to the puzzle topic! * Work your way through over 200 puzzles * Create and share your own puzzles to stump your friends * New community made puzzles added regularly * Apple Watch support lets you play right on your wrist!

Click here to learn more and download the app.

Click here to play Episode 67

Wednesday
Sep232015

Aussie Mac Zone - iBT 66

This is an episode of the Aussie Mac Zone podcast which I regularly participate in. It is a weekly news show, and covers mainstream Apple stories from an Aussie point of view. If you’re interested in subscribing click here

Click here to play Episode 66

Monday
Sep142015

Mac oS X Security, Kayaker's Top Ten Tips - iBT 65

Although Kayaker's cove could be described as a quaint, warm inlet with calm lapping waves, the ocean can be a dark, violent place with giant rogue waves and swashbucklers and pirates just over the horizon. As is the sea, so goes technology.

Every week there are new stories of data breaches and new security exploits putting your data at risk. You will never be safe. But don't go off the grid yet or pull that boat into dry dock. There are easy things you can do to help reduce your exposure on the high-tech seas, so let's get started! Here's my top ten security tips and best practices list for you.

  1. Don't Run as Admin

    They still call it a personal computer, and many of us still think of it that way. It's my computer, so why would I have more than one account set up on it? Well, that's probably your biggest security risk, and it started from the moment you booted your Mac for the very first time and it asked you to create a username and password. That initial account has what is called admin level privileges and has the potential to tweak just about every file on your computer. Any application you run will have admin privileges, and thus any application you run can change about anything on your system. A malicious piece of software would love to have that chance. I always recommend two accounts on your Mac, one that is your admin account that you set up when you first set up a new Mac, and then a standard account, which is your main account you use every day. I use the user MacAdmin as my admin account, and kayaker as my main account. You would set this up by going to System Preferences, Users and Groups. From there, you should see the Users table and ideally you want to see that you have an account with admin privileges and another with standard privileges. The way you can tell which is which is in the user account info section, where you should find a checkbox that says something like Allow this user to administer this computer. There has to be at least one account that has this ability. If you only have an account with admin privileges, you need to correct the situation. To do this, create a new account called MacAdmin and give it the ability to administer the computer. Then, go to your personal account name and remove your main account's ability to administer the computer by unchecking the checkbox.

    So what does this mean for your day-to-day life? Not much. If you ever are prompted with a dialog to enter admin credentials, instead of just typing your password, you instead need to enter the MacAdmin username and the MacAdmin password. That's about it. This simple step has now prevented what we call an escalation of privileges attack, one of the most common attack vectors for malware.

  2. Time to Give Up Your 1234 Password used everywhere

    If you keep the key to your treasure chest on top of the chest, well, I'm certain Captain Jack will thank you. You are only as safe as your passwords. This is the weakest link in any security system. So you need to make it strong. In fact, you can google “most common passwords” and get a list. Your password better not be on it. So, how do you make a password strong? I suggest that whatever you use, it not be in a dictionary, or in the script of any Star Trek or Star Wars movie. Mixing numbers and symbols in is always a good thing. I also suggest you make it at least 12 characters long.

    Now that you have a strong password, make sure you use it for one purpose. If you have another account, use a different strong password. Hope you just didn't make your admin password the same as your main user password just now. A sad but true fact is that Web developers are lazy. Anyone who stores your password should be saving not the password, but a hash of your password. And I won't go geeky technical here, but in general, a hash cannot be used to figure out your actual password. It is just like what Apple does with your touch ID info: they hash your fingerprint and save the hash, not the fingerprint. Unfortunately, you have no insight as to how any site you visit saves your credentials. So, if bad guys steal data from your favourite gossip site, and that site saved your password as text, and that's the password you use all over the Web, well, there goes your bank account balance.

    I know, I know, you have passwords for every site out there. How on earth can you keep track? There are some great applications out there to help you manage all your credentials. I personally use 1Password by Agile Bits. It's cross platform and secure. Despite the recent news of data being potentially compromised from LastPass, that's another good option. LastPass keeps your data very secure and even if bad guys had their entire database, it's so heavily encrypted that it would be impossible to crack it in your lifetime and that of your great-great-great-grandkids' lifetime as well.

  3. I m the Key Master, are you using the Gatekeeper?

    It doesn't take a ghost to haunt your computer with malware. You can accidentally run an app that installs a demon of a daemon onto your Mac. Fortunately, MacOS has a security feature called Gatekeeper that will warn you if it thinks you might be running an app that you shouldn't. You can find Gatekeeper in the General tab of the Security and Privacy System Preference pane. There, you will find a radio button to complete the sentence: Allow only downloaded apps from, and suggest you use the second radio button, from the app store and identified developers. This is the default setting. But even if you want to run an app that Gatekeeper doesn't know about, fear not. You can easily override the warning by right clicking on the app and choosing open, and then confirming you want to open it on the next dialog box.

  4. News Flash: Don't Use Flash

    This is an easy one. Never never never install Flash on your Mac or PC. That's it. Flash is probably the single largest attack vector of virus and malware out there today. And you can get infected by just visiting any site that uses an ad service that has an infected ad. Bang. Your computer is now compromised. Did I mention to never never never use Flash? But if there is a site that needs Flash that your life depends on, use the Chrome browser and make certain you've done everything else on this list to help mitigate potential damage. Did I mention to never never never use Flash?

  5. Disable Opening of Safe Files

    Safari tries to be helpful and will automatically open safe files. Sorry, there is simply no such thing. A clever JPEG file can infect your computer; a clever PDF file can infect your computer. There is no such thing as a safe file. So go to your Safari preferences and uncheck "Open safe files after downloading." This will mean you will have to go to your downloads folder to open files you have downloaded, but it also means you won't accidentally download and run a maliciously crafted "safe" file from a bad guy.

  6. Disable Auto Login

    You don't sail off the coast of Somalia with a sign that says we will pay ransoms; nor should you make it easy for someone to steal your data. If you turn on your Mac and are brought right to your desktop without having to enter your username and password, you're giving anyone easy physical access to your computer. It's just like leaving your house keys hanging in the lock of your front door. It's easy to fix this in System Preferences, Security and Privacy, General tab. Make certain that your settings are not set to auto login. In earlier versions of MacOS X, this option was found in the Users and Groups or Accounts System Preference pane in the login options section.

  7. Don't Click That Link!

    This is analogous to don't call me, I'll call you. The majority of malware infections are done by phishing attempts. These are e-mails or pop-ups asking you to click on something or install something that will take you to a fraudulent website where bad things will happen. Never click on a link in an e‑mail or click on a pop-up from a browser that asks you to update something. The simple rule is that if you did not initiate the contact, then don't click on any link, even from your mother. But if you signed up for something like a new account from a particular site, and they send you a confirmation e‑mail in the time frame of your interaction with that site maybe asking you to verify your e‑mail by clicking on a link, then that's probably OK since you initiated the contact. If you are uncertain about the validity of an e‑mail, then go to the website not by clicking on the link in the e‑mail, but by typing the address in your browser directly. And don't forget to look for that https protocol, not just http. That S is for ‘securer.’

  8. Certificates and the Price of Free WIFI

    Public WIFI access points are just that: public. Be very careful about sending or doing anything critical over them. This goes for hotels and coffee shops. The risk here is about man in the middle attacks. If you can join a WIFI network, then a bad guy can join a WIFI network. If a bad guy can join, then a bad guy can see all traffic, and if he can see all traffic, he can spoof an extenuation of the network and force you to connect to his computer as your access point. He can then see any nonsecure traffic leaving your machine, and could possibly trick you into letting him see encrypted traffic as well, by issuing you a non-validated certificate. I could do a whole podcast on certificates, but for now, think of certificates as ways to encrypt your data and verify the identity of the website you are connecting to. If you ever see a dialog saying your browser cannot verify the identity or validity of a certificate, do not click Continue or OK if you are using a public access point or are connecting to an important website. The exception to this rule is if you are connecting to a small or personal website. These certificates are often just used for encryption and are what we call self-signed certificates. I have a self-signed certificate for my domain because certificates cost a lot of money to get, and I'm only interested in using it for encryption. Just be very, very mindful of any certificate warning you receive from your browser.

  9. Those Three Security Questions Aren't

    The advent of security questions was to solve one problem only: too many support calls about a forgotten password. It's not about security. Besides, your Facebook page and Google could probably give a bad guy all the answers he needs to take over your account, so don't let it happen. Those answers may be required to set up an account, but you need not be truthful. Make your answers as random as your passwords. Use your password manager to store your answers. Don't make it easy for social engineering to steal your identity.

  10. Stay Up-to-Date

    This may be obvious, but make sure the software you run is up-to-date. That goes for your Mac OS version as well as your apps. If exploits are discovered and then fixed, you need to update to get that fix. But if you are not using the built-in software update mechanism or the app store, just be careful about how you get your updates by making sure you are going to the developer's site directly.

Click here to play Episode 65

Saturday
Jul042015

Alexa - iBT 64

We want to tell you about a petite young lady, Alexa, who recently came ashore at Kayaker’s Cove. You may have heard the Echo of her voice already. However, if you’re still on the fence, and not sure if you should invite her in to your own life, take a listen to Kayaker’s experiences.

Along with the device, Amazon makes available an iOS app. The app is not completely accessible however you can certainly use it to get your new Echo connected and ready to respond to your every whim, well at least some of them.

Click here to play Episode 64

Sunday
Jun072015

Voice Dream Mail - iBT63

On this episode I take an introductory look at the iOS app Voice Dream Mail. This app is free and from within you can purchase a subscription to unlock further features. Read on to see what the developer has to say about the app…

App Store Description

Voice Dream Mail works by speech and touch, so you can efficiently go through your email inbox without having to use your eyes. How It Works The app reads your email out loud using text-to-speech. You control it using the entire screen of your iPhone or iPad as a touchpad. For example, swipe right anywhere to advance to the next email, and swipe down to trash. Why It's Efficient Once you learn the handful of gestures, you will be able to triage your inbox very quickly. You know what to do with most emails after hearing the sender and subject. Because all commands can interrupt reading, it only takes a few seconds to handle each email. Plus, you can gradually increase speech rate: most people can listen at a higher speed than they can read visually.

Check out the app on the App Store to learn more and download.

Click here to play Episode 63

Friday
Feb272015

Project Starfish - iBT 62

I had the pleasure of talking to Subs and Amanda from the Project Starfish team. This is the second time I’ve had the opportunity to interview them and both times I’ve been personally inspired by the project and members.

Project Starfish is an inclusive, professional, experiential, learning platform. And if you want to know what that means or how they help blind and vision impaired people gain the skills and experiences required for work in the contemporary business world, take a listen to the show.

Get in touch with the Project here..

Click here to play Episode 62

Tuesday
Feb242015

Update For Shortcuts Keyboard - iBT 60 Followup

Following up on my demo of the Shortcuts Keyboard App the developer has offered to drop the price to free again on March 3. If you haven’t already taken the opportunity to pick up the app, then I recommend grabbing it. If 3 March 2015 is history when you’re reading this and the price is back to it’s normal price , then pick it up anyway, it’s worth it.

You can visit Shortcuts Keyboard on the App Store to find out more about the app and get the app.

Click here to play Announcement

Monday
Feb022015

Feel Your Way with iFeelaGrams - iBT 61

I speak to Tom Dekker from iHabilitation Canada in this show. Tom tells us about the release of his latest tactile diagram book and gives us some insight on why he first started creating these fantastic resources for blind and low vision users of iOS devices. We also discuss the companion videos that have been created to use in conjunction with the book. The videos are freely available from Tom’s site by clicking here.

Other topics touched on in the show include The benefits of using the SpeedDots screen protectors, and Tom’s upcoming potential collaborations with Fedora Outlier and Blind Alive.

Click here to play Episode 61

Tuesday
Jan132015

Shortcuts Keyboard App - iBT 60

In this episode I take a look at the iOS app Shortcuts Keyboard.

An extremely useful third party keyboard for iOS 8.

App Store Description

Shortcuts Keyboard is a keyboard that allows you to add text based shortcuts to use in your favourite apps. It's great for quickly sharing an address of the party you're going to, your email address, and so much more! – Add your own text-based shortcuts – Works in your other apps such as Messages, email, and facebook messenger! Create shortcuts for quick access to sharing your email address, directions to your house, helpful information, or quick status updates such as, "Hey, I'm on my way, I'll be there soon!" or "There's a party tonight at 1 infinite loop around 7pm, think you can make it?"

Visit Shortcuts Keyboard on the App Store to read more and get the app.

Click here to play Episode 60

Wednesday
Dec312014

iTired - iBT 59

Welcome back to the iBlindTech Democast. The iOS app iTired is the subject of this episode. It’s a simple app which solves a simple yet annoying problem, simply and effectively.

App Store Description

Listen to audiobooks or podcasts in bed? Tired of waking up hours later and having to spend minutes to find out where you nodded off? iTired solves this problem by doing an alertness check every few minutes. If you don't respond, it stops playback and optionally rewinds to the time you were last alert. A simple solution to an annoying problem.

You can read the rest of the description and purchase iTired by clicking here.

Click here to play Episode 59

Monday
Feb242014

The Siri Voices for Voice Over - iBT 58

Hugo’s back with another jail break episode. He shows us iSounds and iFile. If you’ve ever wanted to use the new Siri voices for Voice Over, than this is the episode. Take a listen. 

Click here to play Episode 58

Monday
Feb032014

A Look at Finder on the Mac - iBT 57

On this episode I take a look at Finder on the Mac. I cover a number of the basic concepts such as copying and moving files, efficient system navigation, launching applications and some useful keystrokes. This is more of an introduction to OSX than an introduction to Voiceover. I hope you enjoy.

Click here to play Episode 57

Thursday
Jan232014

Jail Breaking 7.04 - iBT 56

Hugo joins us again today to walk through jailbreaking iOS 7.04. With Apple’s latest beta release of iOS 7.1, it appears they have closed the exploits that allow this jailbreak. Also many of the problems that users were experiencing when this jailbreak was released have now been fixed. So if you’re considering a jailbreak, now’s the time to jump on it. 

Click here to play episode 56