Author: <span class="vcard">mcasey</span>

Why Won’t iTunes Put My Songs Together?

A big collection of digital music in iTines can easily become a mess.

Sometimes when you try to assemble your songs into an album format, iTunes may refuse the changes to the song tags even when you have manually reset them!

Here is a trick I have used successfully many times to collect many divided songs into one album, whether iTunes agrees, there are mislabeled or conflicting fields or not:

 

Find the two albums you want together for whatever reason.
Choose the Album name you want for all of them.
In this case I used “English Graffiti [Deluxe]”

 

Next use the Shift, Control or Command keys to select them both..

Right click to choose “get info”

You will see a screen similar to this one.

.

Make sure there is only one reference to the artist name and album.

The fields: album artist, composer, grouping, disc numbers should all be empty

Next, check “album is a compilation” whether it is or not.

Click “ok”

Check the album in iTunes and it should have combined them together into one album.

If not reopen the “get info”window and deselect the compilation box and that should do it.

After combining your songs into one album,

Reopen the “get info” box and uncheck the “part of a compilation”

Click ok again.

That should do it!

Now you can reopen the album’s songs and using “get info”, edit your individual tracks information as you wish.

Hope someone may find some value in this. Sure has helped me manage a big library of music.

Only Secure As Our Weakest Link

A common topic among digital communications and the IT professionals lately has been the dangers we all face if our digital identity security is compromised. Today we all have our own individual digital identity. Our digital profile is created over time from everything we have ever done using digital channels.

It’s concerning that some people really don’t realize that they are only as safe as their weakest online account. Whether it’s a business or an individual, our security is only as strong as the weakest link. This “weakest link” in our least secure data access point on the Internet.

Most of us forget about some of our old accounts or emails we created. These are vulnerable access points into more valuable personal data. These insecure points can be old email accounts, unused online memberships, eBay or other old digital commerce accounts, emails left over from previous employers, etc.

These weak points can be weak links into our digital profile. Information from these weaker accounts can give hackers easier access to info needed to get at our valuable accounts.

These access points and accounts that may contain: Personal information, reused passwords, phone numbers, family members names, etc. All are potential ways into our existing digital channels.

The danger is far greater than just people using our credit cards. Many people think the problem isn’t that serious because it’s just “Visa replacing my money and sending me a new card”.

Some of these other concerns: Using your identity to access to your other accounts, opening new credit card accounts, gaining access to your social security number to work under your identity, approve major property purchases, open false loans, open online selling accounts for money laundering and reselling stolen goods, etc.

Some Recommendations to Protect Yourself

  1. Use an antivirus and malware application and leave it on at all times.
  2. Never use your debit card online. This gives out your bank account details and direct access to your money.
  3. Delete old social media and email accounts.
  4. Use a separate password for each website and complex passwords that contain numbers, symbols, capitals and lowercase characters.
  5. Keep a digital record of your passwords in an Excel or other spreadsheet. Be sure the spreadsheet has a master password to protect it.
  6. Turn on and use your computer’s firewall. Only allow access for software and sites you are sure you can trust.
  7. Consider adding security extensions to your browser such as: Ghostery to monitor and easily control the way websites track you. Click&Clean to delete your tracks online to minimize private info about you in your browser history.
  8. Use two-factor authentication. This is the service that sends you a text or a call when you log-in to your accounts as a secondary security check. This results in a huge increase in security, but many people skip it since it’s a bit annoying.
  9. Check and verify old employers have removed your profile and email from their systems. If they need to stay open, periodically check them to be sure they are still secure.
  10. Create and use only new and individual passwords on all websites. Retire old and reused passwords.
  11. Use passwords that don’t include info related to your personal information such as birth dates, children’s or spouses names, your address, phone numbers, your age or date of birth.
  12. Use a password manager such as LastPass, Dash Lane, Keeper or another with positive reviews. Many password managers are free or very inexpensive.
  13. Consider using a VPN (virtual private network) when accessing your financial accounts, paying bills or other sensitive business tasks online. Private Internet Access and TorGuard are a couple VPN developers that are proven to be secure. These mask your IP address, so anyone tracking you cannot reach your digital access point.

Hope this has some value to it’s readers. Approach the Internet in general with skepticism to be safer online.

 

Grandmasters Wing Chun Kung Fu

Grandmasters Wing Chun went live today!

Thank you to Mike Selner of Tela.com for his web hosting, knowledge and technical expertise!

Be sure to check it out if you want to become like Bruce Lee and Ip Man!

 

Hotz Law Website Launched!

We just launched a new website for our fantastic client, Darrel Hotz Law Offices in Toronto, Canada at:

www.dhotzlaw.com.

 

Long Hours = Casual

Well, not the most professional I’ve ever looked, but with this much going on, who has time to dress up just to do work?
Now my great customers can now see I am working on your projects by day and by night!

The Dark Web

Peeking Into The Dark

A brief glimpse into the Dark Web shows are level of vulnerability. People looking for digital information and tools to commit crimes go to covert websites like we might go to Amazon. Instead of everyday items, they are their shopping carts, and they do look and act like ecommerce shopping carts, to buy credit card information, personal identification data and Paypal information. They also sell software designed for all levels of intrusion and control of computers and networks connected to the internet. The better the stolen information or the intrusion software, the higher the price.

Digital Money & Invisible People

Transactions can go on through anonymous, encrypted data transfers and online accounts many, many users deep. People can hide who they really are creating a user or business name or email, etc. to create an account, then that one to create another account, etc. The end result is a twisted and tangled web of email addresses and scrambled ide

ntification. This is part of how digital criminals hide online. Another popular way to carry on this illegal and unethical business is through using the digital and anonymous currency of Bitcoin.

Improving Security

I plan to learn more to better protect myself and my clients and take the complete course on ethical hacker information and cyber security. I will post more as I learn things that may be of use. Watch your digital backs my friends.

Mac’s Not Immune Anymore

Mac’s Not Immune Anymore

Hello fellow Mac users. We are moving into the PC world more every day. If you have antivirus, spyware and malware removal tools and use them regularly, you’re a smart person. Mac’s are no longer immune from these things just because they are Apple computers. Those days of being safe because you’re on a Macintosh are long gone.

Dark Web

Since the web and Internet are my business, I feel it’s my responsibility to know as much as possible about the Internet. The more I know the better. I recently spent a little time learning about the Dark Web. I feel if I don’t know something, I’m more likely to fall prey to it.

Staying Safe

I thought my Mac based system was secure. I use a VPN, regularly run malware detection software, delete suspicious cookies, use an Ad Blocker, etc. Reading about the Dark Web was disturbing. I decided to run a deep scan of my whole system with Mac versions of Bitdefender’s Antivirus and cross check with AVG Antivirus, as well as running MalwareBytes malware removal tool, CCleaner and PrivacyScan. I checked all my drives and compressed archives from my years in business. That meant deep scanning nine drives and partitions. The process took about 24 hours in total!

Was I Protected?

Well, I wish I could say it was 100% clean, but despite my efforts I located and removed adware, malware and a few viruses engineered for the Mac. Without running complete and deep scans with excellent software, not all these threats showed up. It shows how diligent we need to be to protect our data and privacy.

 

New Updates at Dynamic Family Chiropractic

Check out the new website changes at our customer’s website at Dynamic Family Chiropractic!

 

Left Brain & Right Brain People a Myth

No Right Brain & Left Brain

My son Adam had mentioned that new studies had shown that they have debunked the theory of dominant right and left brain hemispheres. I had to do some research and see what the facts were on this.

Well, I guess I can’t claim my artistic side comes from my right brain anymore. I feel silly now looking back on recommending the book “Drawing from the Right Side of the Brain” to my design students. I guess we should all stop saying we are “left or right brained” people.

Scientific research has now shown that everyone actively uses both sides of their brains for creative and analytic tasks. All the techniques to develop the separate hemispheres of the brain, if they do anything, are not because we have dominant hemispheres of the brain.

Science progresses and we often find “truth” becomes myth. The science that was based on personality linked to bumps on one’s head and the idea of falling off the flat earth now seem ridiculous. Now the right and left brain belief has been shown to be untrue. All of us, like myself, who believed this “fact” now seem pretty stupid. From now on I won’t be claiming that the right or left brain was a cause of this or that phenomenon. Sorry if this blew your creative right or mathematical left hemisphere!

There is a link to the science behind this discovery here.

 

Cut & Paste Files on a Mac!

Yes Virginia! There Is A Copy-Paste Function To Move Files In The Mac OS!

I’d love to take credit for this one, but the source is another website. My Adam the computer science major and I debated this one. I have to admit Adam, you were correct!

The Short Answer

If you want the short answer and are a seasoned Mac user:

  1. Select files you want to move in the Finder.
  2. Select “copy” or use the key commands “Command-C”
  3. Open the place where you wish to move the files to in the Finder.
  4. When you wish to move them, instead of the standard copy command “Command-V” instead use”Command-Option-“V””
  5. The files will be moved to the new location.

For more instructions on how this works, here is a link to the source website:

http://osxdaily.com/2011/07/29/cut-and-paste-mac-os-x-lion/