Move iTunes from PC to Mac

As of iTunes 9, it is pretty simple to move the iTunes library from one computer to another, even between Windows and Macs. These instructions detail a move from a PC to a Mac.

  1. Update to latest version of iTunes on both systems. In Windows: open iTunes, then Help -> Check For Updates. On Mac: open System Preferences then Software Update.
  2. In Windows: open iTunes’ preferences (Edit -> Preferences) and click the Advanced tab. Check both Keep iTunes Media folder organized and Copy files to iTunes Media folder when adding to library. These settings keep all your media files in the main iTunes Media folder, which you will later copy to your Mac.iTunes Advanced Organized
  3. In Windows iTunes: Choose File -> Library -> Organize Library. Check Consolidate Files, then click OK. This moves any files that weren’t in the right folder and makes sure that the library file has the correct pointers to these files’ locations. If the Upgrade To iTunes Media Organization option is not dimmed, check this too; it sorts your files in separate sub-folders.iTunes Consolidate Files
  4. Copy the iTunes folder (in Windows 7 located in username\My Music\iTunes, in Windows XP located in Documents and Settings\username\My Documents\My Music\iTunes). You can copy by sharing the folder over the network, copying the folder to an external drive, or by pulling the Windows computer’s hard drive and attaching it to the Mac by a USB adapter (see picture). Pulling the drive is usually the fastest method if you have a huge library. Copy the iTunes folder to the Music folder in your user folder on the Mac. If there is already an iTunes folder, it means you’ve launched iTunes at least once on the Mac. If there’s no music there, you can just replace the folder. However, if you’ve already added music, you won’t be able to merge the libraries; in the iTunes Media folder, found in the iTunes folder, move the Music folder to your desktop and add those files into iTunes after you’ve completed this process. (Note that you’ll lose any playlists and play counts associated with those files. Alternatively, you can add the music from the PC to Mac’s iTunes by dragging it into iTunes, thereby losing the playlists etc of the PC’s music.)USB IDE Hard Drive Adapter

Create Panoramas with Hugin

Hugin is free open source software for creating panoramas from a series of photos. It is not terribly difficult to use, but you should follow one of the tutorials such as the Lifehacker Hugin tutorial. This explains how to set control points between photos in order for Hugin to know where things line up.

There are downloads for Windows, Mac, and various flavors of Linux. For simplicity, download from the pre-compiled versions.

NY Panorama from Hugin

Windows Phone 7

Surprisingly, Microsoft Announces Cool Phone

While Apple’s iPhone is the leader in smartphones, there is competition from Google’s Android phones, RIM’s Blackberries, and Palm’s Pre. This week’s announcement of Windows Phone 7 Series at the Mobile World Conference in Barcelona should put Microsoft back in the competition.

While Microsoft has made phone software for over 13 years, the phones were never popular outside of business. The phones looked like slimmed down versions of Windows and were clunky. With Windows Phone 7, Microsoft is using the acclaimed user interface from their Zune music players and completely revamping the phones.

Expect to see phones running Windows Phone 7 around November 2010.

Note the first line of this video demo/promo. It says “A different kind of phone…” Reminds me a little of another company with small market share that asked people to “Think Different.”

For more videos, see Microsoft’s YouTube page on Windows Phone 7.

12 Tips for Protecting Your Computer from Snoopers

In the DC area especially, there are people who have reason to be concerned about computer espionage, either for work (national or corporate secrets) or personal reasons (divorce or blackmail). Here are 12 tips to guard against intruders snooping on your activities:

  1. Use decent passwords. The easiest way for someone to access your email and other information is if they know or can easily guess your passwords. It is estimated that 1 out of every 9 people use a password on the top 500 worst password list. Most passwords are “cracked” not through problems with the encryption itself, but with the password being poor. Don’t use dictionary words, the names of loved ones, the names of your pets, your birthday, etc.  Longer passwords are better so government institutions often require at least 10-14 characters. Passwords should be random and use letters, numbers, and special characters.
  2. Use different passwords for different things. If someone sees your computer login password over your shoulder, you don’t want them to then have access to your bank account because it has the same password.
  3. Change passwords regularly. Government and corporate security protocols typically require that passwords be changed at least every 3 months.
  4. KeePassUse a password manager. Seeing a theme here about the importance of passwords? If you have different random passwords and change them regularly, then you either have a memory like Rain Man or you keep track of the passwords somewhere. The most popular software tools to manage passwords are LastPass (Free or Premium for PC, Mac, and others), KeePass (Free for PC, Mac, and others) and 1Password ($39.95 for Mac). Password software allows you to keep all your passwords encrypted with one master password. It can autofill site information so that you only have to remember that one master password. It also has a Password Generator to create random strong passwords, a great idea. Without this, most people use passwords that are similar. To the extent that your passwords are similar, an investigator can more easily guess your other passwords. (Tip: use Dropbox to backup/sync KeePass or 1Password encrypted files. LastPass syncs automatically between computers).
  5. Do not use personal information that can be guessed as the answers to your online secret questions. This is how Sarah Palin’s Yahoo email was “hacked” in September 2008 simply by someone guessing the answers to her challenge questions such as where she went to high school.
  6. Tie your Yahoo or other login site to another email account or cell phone number. This will let you know of any attempted password resets and help if tip 5 doesn’t work.
  7. Encrypt files. As we explained in our post Encryption on USB Flash Drive, TrueCrypt can be used to encrypt your important data. Remember that although TrueCrypt can not be cracked, someone could guess your password if you chose it poorly.
  8. Remember that your router is a computer too. Your router manages all the data between your computer and the Internet. If your router software is compromised, you could be sent to a site claiming to be your bank but really being a completely different site due to website misdirection from a bogus DNS system used by your router. The router software should be checked, firmware reloaded, and the password on the router should be changed. Most people unknowingly leave the router login defaults. That is safe enough if your local network is not breached, your WiFi isn’t hacked, and your router is not remotely accessible.
  9. Use strong WPA2 WiFi encryption. WPA2 is not easily cracked like WEP. Tools such as BackTrack and KisMAC can crack WEP in minutes. (See photo of “war driver” below hacking into a WiFi network.)War Driver Hacking into WiFi
  10. Turn down your WiFi antenna strength. Hackers can crack into a WiFi access from over a block away with directional antennas and a good line-of-site to their target. If you don’t need the extra signal strength, turn it down since a weak signal is harder to crack. This isn’t an option on all routers. If you want to take extra control of your router for this and other options, see if you can load the alternative DD-WRT firmware.
  11. Check for keyloggers. Keyloggers will log everything you type. They can be in the form of software or physical devices that are attached to a USB port or between the keyboard and computer.Keylogger
  12. Wipe computer and start fresh. If someone has had physical access to your computer or if the computer is already compromised, all bets are off. Some experts and government institutions will simply decommission a compromised computer and trash it. But most people should be satisfied with wiping everything. The hard drive can be wiped and the operating system reinstalled. The BIOS (seen from the very initial startup) can be reflashed and checked. The computer can be opened and physically checked for modifications.

Let me know if you have other suggestions for keeping your computer information safe from surveillance.


Thunderbird Add-ons

ThunderbirdYou might have heard about add-ons for the popular web browser Firefox that give it more capabilities. Well, the folks at Mozilla also make a great email client called Thunderbird (PC, Mac, Linux) that has add-ons too.

I found this out when I needed to send someone hundreds of emails. The Add-on ImportExportTools (which oddly is not part of Thurderbird’s list of Add-ons) was able to take all the emails I wanted and move them into an HTML indexed folder for easy browsing. This powerful add-on also helps in a myriad of cases when migrating or merging email archives, and it performs some import/export feats that are impossible with other email clients such as Outlook and Mac Mail.

ImportExportTools Thunderbird Add-on