Setup Time to Leave Notifications on iPad and iPhone

Apple has introduced the Time to Leave feature for iOS 18, which alerts users when it’s time to depart for calendar events. By enabling Location Services and adjusting settings in the Calendar app, users receive timely notifications that include traffic conditions, ensuring they arrive on time to their destinations.

RAYMOND OGLESBY @RaymondOglesby2
February 11, 2025 – 3 minutes read time

Have you ever wished your iPad or iPhone would not only remind you of calendar events but also give a calendar alert when it’s time to depart? Well, now you can. Apple has just introduced the new Time to Leave feature, which automatically calculates when you need to leave your current location so you can arrive at your destination on time. Let’s explore how to use the Time to Leave feature.

  • Get notified when it’s time to get in your car and head to your appointment or meet-up.
  • With built-in drive time reminders, you need never be late again!

The steps below will only work on an iPhone updated to iOS 18. The screenshots are from iPhone 14 Pro running iOS 18.3.

Click here to learn how to update your iPhone to the latest iOS version.

You will also need to be sure Location Services is enabled. Head to:

Settings > Privacy & Security > Location Services

and turn the toggle to the ON position.

First, navigate to:

Settings > Apps > Calendar

Refer to the below image:

Time to Leave 1
Open the Calendar app

Next, tap the Default Alert Times option. See the below image:

Time to Leave 2
Select the Default Alert Times option

Now, toggle Time to Leave to the ON position.

Note! the Event must be set to None for this feature to work!

See the following image:

Time to Leave 3
Enable Time to Leave toggle

Next, open the Calendar app. Refer to the below image:

Time to Leve 4
Open the Calendar app

Now, create a calendar event as you normally would, then tap the Add icon. You will see that your Time to Leave alert has been automatically added to the event. See the below image:

Time to Leave 5
Create a calendar event

Next, open your Calendar and find your event. Tap the event to see its details. Notice the Time to Leave alert. See the following image:

Time to Leave 6
Time to Leave details

At the designated time, you will receive a Notification about the event that includes traffic conditions and travel time to reach your destination. Refer to the below image:

Time to Leave 7
Your Time to Leave notification

Now you know how to enable and use Time to Leave alerts in your iPad and iPhone Calendar settings

Technology is always changing. Rarely is there static tech for smartphones and desktops. Thus, the contents of this post are only valid at the time of writing. Blog posts older than six months may have directions incompatible with your device or OS. Hopefully, older post content will continue to work as advertised. Thank you for reading TechSavvy.Life for Technology at Work For You.

The great myth of our times is that technology is communication.

Libby Larsen

That’s it. Please feel free to share this post! One way to share is via Twitter.

Just click the Tweet icon below. This will launch Twitter where you click its icon to post the Tweet.

Checkout TechSavvy.Life for blog posts on smartphones, PCs, and Macs! You may email us at contact@techsavvy.life for comments or questions.

Was this post helpful? We would love to hear your comments. Do you have a computer or smart device tech question? I will do my best to answer your inquiry. Just send an email to contact@techsavvy.life. Please mention the device, app, and version you are using. To help us, you can send screenshots of the data related to your question.

Author’s eBook

The author’s Vietnam eBook on the “Battle for Tra Bong Vietnam: Events and Aftermath” can be accessed from a Kindle device or the Kindle App for a desktop or smartphone. The apps are free.

The author’s Vietnam eBook on the Battle for Tra Bong Vietnam: Events and Aftermath

Maximize Your iPhone Control Center Layout in iOS 18

The Control Center on iOS 18 and iPadOS 18 simplifies access to frequently used features by allowing customization and multiple screens. Users can manage Wi-Fi, Bluetooth, volume, and more, enhancing organization. By arranging controls and adding shortcuts, users can optimize their experience, making navigation more efficient and personalized.

RAYMOND OGLESBY @RaymondOglesby2
December 3, 2024 – 6 minutes read time

For quick access to frequently used apps and settings, Control Center is just a swipe or click away. And with iOS 18 and iPadOS 18, it’s even easier to customize and use.

Navigating the settings on your iPhone, iPad, and Mac can be difficult. That’s where the Control Center comes in, providing quick access to a variety of features that might otherwise be hidden within the device’s menus. From the Control Center, you can easily adjust settings for Wi-Fi, Bluetooth, and AirDrop, as well as control brightness and volume. It also allows you to manage Focus mode, access music controls, switch to dark mode, and enable screen mirroring. Additionally, you can customize the Control Center by adding or removing features as needed.

For many years, the Control Center on your iPhone and iPad was restricted to a single screen. If you wanted to change the controls, you had to navigate into the settings of your device. However, with the introduction of iOS 18 and iPadOS 18, you can now set up multiple screens and customize them directly within the Control Center. Let’s explore how to personalize the updated Control Center.

  • Organize the Control Center so that your most frequently used controls are easily accessible at the front.
  • Maintain a tidy and organized Control Center..

This tip is for iPhones running iOS 18 or later. The screenshots are from iPhone 14 Pro running iOS 18+.

Click here to learn how to update your iPhone to the latest iOS version.

First, swipe down from the upper right edge to open the Control Center. Refer to the below image:

CC 1
Swiping down to access Control Center

Next, rap and hold in an empty area. See the below image:

CC 2
Taping any empty area

Now, the controls will have minus symbols next to them, indicating that you are in Edit mode. Tap Add a Control to get started. See the following image:

CC 3
Selecting Add a Control button

Next, find a control you want easy access to and tap on it to add it to the Control Center. Refer to the below image:

CC 5
Selecting to add the Notes app

Now, if your first page becomes too full, a second page will be automatically created. You can swipe up and down to navigate between the Control Center pages. Each page is indicated by a dot on the far right side of the screen. Please note that we have a total of six pages. See the image below:

CC 5
Notes app has been added

Next, to change the size of a control, tap and drag the corner. Keep in mind that some controls only have one size. See the following image:

CC 6
Selecting Playback control to resize

Now, view your resized Playback control. Refer to the below image:

CC 7
Playback control has been resized

Next, to remove a control, simply tap the minus symbol next to it. See the below image:

CC 8
Selecting to remove the Focus control

Now, you can place controls anywhere without worrying about order. Our Control Center has been rearranged from six pages to only three pages, as indicated by the dots on the right side. See the following image:

CC 9
Final Control Center

FAQ

  • Why does my iPhone say SOS in the top right corner?

If your iPhone cannot connect to a cellular network or Wi-Fi, it may display ‘SOS’ in the top right corner. This indicates that your device can only make emergency calls.

  • What does 5GUC mean?

5GUC stands for 5G Ultra Capacity. This is T-Mobile’s higher frequency 5G network. Other cellular providers have similar higher frequency networks with different names.

  • What are the icons on the top right of iPhone?

At the top of your iPhone screen, you will typically see the strength of your cellular network represented by bars. To the right of this, there will be an indicator showing 4G, LTE, 5G, or a similar symbol if you are connected to a cellular network. If you are connected to Wi-Fi, you will see a Wi-Fi symbol instead. Finally, you will also find the battery indicator for your iPhone.

  • What do the iPhone signal symbols mean?

The signal symbols indicate whether you are using cellular data or Wi-Fi, as well as the strength of the wireless connection.

That’s how to customize the Control Center on your iPhone. We recommend placing your most-used controls on the first page.

Technology is constantly evolving, and smartphone and desktop tech rarely remains static. Therefore, the information in this post is only accurate as of the date it was written. Blog posts that are older than six months may contain instructions that are no longer compatible with your device or operating system. We hope that the content from previous posts continues to function as intended. Thank you for reading TechSavvy.Life, where technology works for you.

 “The march of science and technology does not imply growing intellectual complexity in the lives of most people. It often means the opposite.”

– Thomas Sowell

You are finished with a revised Control Center. Please feel free to share this post! One way to share is via Twitter.

Just click the Tweet icon below. This will launch Twitter where you click its icon to post the Tweet.

Checkout TechSavvy.Life for blog posts on smartphones, PCs, and Macs! You may email us at contact@techsavvy.life for comments or questions.

We value your feedback! Was this post helpful? Please share your comments with us. If you have a tech question related to your computer or smart device, feel free to reach out. Just send an email to contact@techsavvy.life, and be sure to include the device, app, and version you are using. To assist us further, you can also attach screenshots related to your inquiry.

Author’s eBook

The author’s Vietnam eBook on the “Battle for Tra Bong Vietnam: Events and Aftermath” can be accessed from a Kindle device or the Kindle App for a desktop or smartphone. The apps are free.

The author’s Vietnam eBook on the Battle for Tra Bong Vietnam: Events and Aftermath

Enable iPhone Text-to-Speech for Easy Listening

The post explains how to enable the text-to-speech feature on iPhones or iPads, allowing users to listen to content like web pages or ebooks while multitasking. It details the setup process through the Accessibility settings and provides tips on adjusting voice options and speaking rates for an enhanced listening experience.

If you find it more convenient to listen to some text on your iPhone or iPad rather than read it, you can easily enable that capability. You might, for example, want your device to read a web page, ebook, or another document while you perform household chores.

RAYMOND OGLESBY @RaymondOglesby2
November 19, 2024 – 5 minutes read time

Apple ensured that the iPhone came with a broad array of built-in accessibility features so anyone can use it. Text-to-speech is just one of these accessibility options. Let’s explore how to set up and use text-to-speech.

  • Listen to web articles or books when you are busy with other tasks.
  • Have your iPhone or iPad read to you if you have difficulty seeing the screen well.

This tip works on iPhones running iOS 16 or newer. Screenshots are from iPhone 14 Pri running iOS 18+

Click here to learn how to update your iPhone to the latest iOS version.

First, open the Settings app, and tap Accessibility. Refer to the below image:

Read 1
Selecting the Accessibility option

Next, tap Spoken Content. See the below image:

Read 2
Selecting the Spoken Content option

Now, tap the toggle next to Speak Selection to enable or disable it. See the following image:

Read 3
Enabling the Speak Selection toggle

Tap the Highlight Content option to highlight each word as it is spoken (this is optional). Refer to the below image:

Read 4
Selecting the Highlight Content option

Next, you can tap Voices to choose a different computer-generated voice. See the below image:

Read 5
Selecting a Voice and its options

Now, you can also select your Default Language. (Ours is set to Current Locale which is English). See the following image:

Read 6
Selecting the Default Language

If you change your Default Language, you can turn the toggle next to Detect Languages to Off. This will let your iPhone read in other languages instead of translating in your default language. Refer to the below image:

Read 7
Enabling the Detect Languages toggle

The Speaking Rate slider allows you to adjust how fast or slow the text-to-speech voice reads. See the below image:

Read 8
Setting the Speaking Rate slider

Next, you can add Pronunciations, if the text-to-speech voice is not pronouncing something correctly. See the following image:

Read 9
Adding Pronunciations

To use text-to-speech, tap and hold some text to highlight it or use the Select or Select All option. Refer to the below image:

Read 10
Highlighting text to read aloud

Now, tap the Speak option, and your iPhone will read the text aloud. See the below image:

Read 11
Selecting the Speak option to read the highlighted text

Next, to stop your iPhone from reading the text, tap the highlighted text, then tap the Pause option. See the following image:

Read 12
Selecting Pause option

You can use text-to-speech to have your iPhone or iPad read aloud to you if you have trouble reading everything on your screen, or while doing chores, cooking, or going for a walk.

Disclaimer

Technology is always changing. Rarely is there static tech for smartphones and desktops. Thus, the contents of this post are only valid at the time of writing. Blog posts older than six months may have directions incompatible with your device or OS. Hopefully, older post content will continue to work as advertised. Thank you for reading TechSavvy.Life for Technology at Work For You.

 “Proverbs are all very fine when there’s nothing to worry you, but when you’re in real trouble, they’re not a bit of help.”

L.M. Montegomery

Congratulations, you are finished. Please feel free to share this post! One way to share is via Twitter.

Just click the Tweet icon below. This will launch Twitter where you click its icon to post the Tweet.

Checkout TechSavvy.Life for blog posts on smartphones, PCs, and Macs! You may email us at contact@techsavvy.life for comments or questions.

Was this post helpful? We would love to hear your comments. Do you have a computer or smart device tech question? I will do my best to answer your inquiry. Just send an email to contact@techsavvy.life. Please mention the device, app, and version you are using. To help us, you can send screenshots of the data related to your question.

Author’s E-Book

The author’s Vietnam eBook on the “Battle for Tra Bong Vietnam: Events and Aftermath” can be accessed from a Kindle device or the Kindle App for a desktop or smartphone. The apps are free.

The author’s Vietnam eBook on the Battle for Tra Bong Vietnam: Events and Aftermath

How to Disable AI Overviews in Google Search

This post provides tips for handling AI-generated summaries in Google search results. It explains how to disable these overviews using specific search modifiers.

RAYMOND OGLESBY @RaymondOglesby2
July 23, 2024 – 3 minutes read time

This is for devices running Google or Bing. Screenshots are from Windows 10 desktop

Open Google, click the 3-dot menu icon (upper right corner), then click the Settings option. If Google is outdated, it will automatically update.

  • View your Google or Bing search results without an AI-generated summary.
  • Narrow your search results to what you just want to preview.

We rely on Google every day to provide us information. But what happens when our source of knowledge becomes messy and unreliable? AI Overviews utilize Google’s Gemini AI to provide an answer to your query right on the search page; no need to click.

Still in its infancy, this feature occasionally surfaces incorrect information, so some web surfers look to disable it entirely. There are a few ways to make an AI Overview go away, but no method is as simple as tricking Google itself into getting rid of it. Google uses search modifiers, named operators, which help narrow search results. Here are a few examples:

  • Use quotations (” “) to search for the exact phrase
  • Add site: to search a single website
  • Search for a certain type of file with filetype:
  • Exclude terms with a minus (-) symbol. The minus symbol stands for NOT.

If we ask “who owns Facebook” an AI-generated summary will be displayed. Refer to the below image:

Google Tip 1
With AI-generated summary

And if you add the term -AI at the end of the query, an overview is not generated. It’s a very simple solution to the AI Overview problem that can be quickly repeated on subsequent queries without needing multiple steps. See the below image:

Google Tip 2
Without AI-generated summary

However, it’s worth noting that this does not work because of the -AI modifier. On subsequent tests, we found that putting pretty much anything in there (Ex: -isports, -farm) also did the same thing.

So, no, Google did not add a secret AI kill switch to its search engine. Instead, AI Overviews are likely only available under certain conditions, and by using a search modifier, you circumvent those parameters. Still, it’s an easy way to game the system until we get an easier way to disable these overlays.

Technology is always changing. Rarely is there static tech for smartphones and desktops. Thus, the contents of this post are only valid at the time of writing. Blog posts older than six months may have directions incompatible with your device or OS. Hopefully, older post content will continue to work as advertised. Thank you for reading TechSavvy.Life for Technology at Work For You.

“Real gs move in silence like lasagna.”

Lil Wayne

That was easy. Please feel free to share this post! One way to share is via Twitter.

Just click the Tweet icon below. This will launch Twitter where you click its icon to post the Tweet.

Checkout TechSavvy.Life for blog posts on smartphones, PCs, and Macs! You may email us at contact@techsavvy.life for comments or questions.

Was this post helpful? We would love to hear your comments. Do you have a computer or smart device tech question? I will do my best to answer your inquiry. Just send an email to contact@techsavvy.life. Please mention the device, app, and version you are using. To help us, you can send screenshots of the data related to your question.

The author’s Vietnam eBook on the “Battle for Tra Bong Vietnam: Events and Aftermath” can be accessed from a Kindle device or the Kindle App for a desktop or smartphone. The apps are free.

The author’s Vietnam eBook on the Battle for Tra Bong Vietnam: Events and Aftermath

Customize Back Tap Gestures on iPhone and iPad for Enhanced Accessibility

The post discusses the accessibility features on iPhone and iPad, emphasizing their importance for users with visual or audio impairments. It provides a detailed guide on enabling Accessibility Shortcut and Back Tap gestures, highlighting various options such as AssistiveTouch, Color Filters, and Voice Control.

RAYMOND OGLESBY @RaymondOglesby2
August 20, 2024 – 7 minutes read time

This is for iPhone and iPad. Screenshots are from iPhone 14 Pro running iOS 17+

Accessibility is always important since it makes devices easier for those with visual or audio impairments. Apple always does a great job with accessibility, and you will find plenty of accessibility options on your iPhone or iPad to make life easier. Perhaps you need to have more sound on one side of your favorite headphones, or you just need to make text easier to read. No matter what you need, iOS 17 and iPadOS 17 are very inclusive, so you will not feel left behind. And to make it even easier to access your favorite accessibility tools, there is the Accessibility Shortcut on your favorite iPhone or iPad.

  1. Launch the Settings app on your iPhone or iPad.
  2. Tap on Accessibility.
  3. Tap on Accessibility Shortcut; it’s all the way to the bottom. Refer to the below image:
Accessibility 1
Selecting Accessibility Shortcut option
  1. Tap the action you would like to perform when you triple-click the Home or Side button so that a blue checkmark appears next to it. You can assign multiple functions to the shortcut.
  2. If you want to reorder the options, just drag and drop. Tap and hold the handle on the right side of each option to move it.
  3. Triple-click your Home button (Touch ID devices) or Side button (Face ID devices) to perform the action you have assigned to the shortcut.
  4. If you have assigned multiple options, simply choose the action you want to perform from the menu. See the below image:
Accessibility 2
Assigning multiple shortcuts and reordering them

Here’s a brief description of the options you have and what they are:

  • AssistiveTouch: Adds the ability to access many common hardware buttons and gesture controls with single taps; a useful feature for those with motor impairments.
  • Background Sounds: A new feature in iOS 15, Background Sounds lets you play soothing white noise to help you concentrate. Using the Accessibility Shortcut toggles your selected sound. First, you need to set up your Background Sounds.
  • Classic Invert Colors: A great option for anyone with a visual impairment such as color blindness. All colors across iOS will be inverted.
  • Color Filters: Changes the color layout of the screen for those with color blindness.
  • Full Keyboard Access: This allows you to navigate the iOS interface without using touch input. A physical keyboard is required to use this feature.
  • Increase Contrast: This will increase the contrast of visual elements on the screen, making it easier to see and read text.
  • Left/Right Balance: This turns on your custom audio balance setting if you have one set up. For example, if you want more sound on the left or right side of your earbuds or headphones, you will want to adjust that audio balance. Turning this off will go back to the default setting.
  • Magnifier: Triggers a camera-style viewfinder with sharp zoom controls so you can see small text. You will need the Magnifier enabled to have this option available.
  • People Detection: With People Detection, your iPhone 12 or iPhone 13 uses Machine Learning with the LiDAR scanner to determine if an object in the camera is a person. You will receive audio feedback to help you determine how far away or close a person is to you.
  • Reduce Motion: This turns on the Reduce Motion setting, which reduces motion in the user interface, including the parallax with app icons. This can also help conserve some battery power.
  • Reduce Transparency: This reduces the transparency used in apps and websites, including blurred backgrounds. Having this on improves the legibility of text.
  • Reduce White Point: Reduces the intensity of bright colors for those with sensitivities or color blindness.
  • Smart Invert Colors: Same as Classic Invert Colors, except it does not change photos, media, and some apps.
  • Switch Control: This lets you use external switches, or the screen itself, as a switch for motor accessibility.
  • Voice Control: This lets you speak commands to your iPhone or iPad.
  • VoiceOver: Allows your iPhone or iPad to speak to you when enabled. Commonly used by folks with visual impairments.
  • Zoom: Allows you to zoom your content for better visibility. You can then use two and three-finger gestures to tap and pan around.
  • Guided Access: This keeps the iPhone in a single app and allows you to control which features are available. You need the Guided Access feature enabled before it is available as an Accessibility Shortcut option.

Once you have made your selection for the Accessibility Shortcut on iPhone and iPad, you can simply triple-click the Home button or the Side button on iPhones and iPads with Face ID from anywhere, not just from Settings, and your iPhone or iPad will enable the function you have selected. To disable it, just triple-click the button again. If multiple functions are assigned, tap the option you want to use.

iOS 14 added a new Back Tap gesture. With the Back Tap, you can double-tap or even triple-tap the back of your iPhone for quicker access to some commonly used actions, such as accessing the Notification Center or Control Center. You can also use the Back Tap gesture to launch Shortcuts that you have created, opening up a whole new world of possibilities.

  1. Launch Settings on your iPhone or iPad.
  2. Tap Accessibility.
  3. Tap Touch. See the following image
Accessibility 3
Selecting the Touch option
  1. Tap Back Tap at the bottom.
  2. Tap Double Tap or Triple Tap to choose an action. Refer to the below image:
Accessibility 4
Selecting Back Tap options
  1. Select an action for your chosen Back Tap. Options include the Accessibility Shortcut that we just created, or you can choose from System, Accessibility, Scroll Gestures, or your own Shortcuts actions. See the below image:
Accessibility 5
Selecting Double and TripleTtap functions.

As you can see, having an Accessibility Shortcut and Back Tap gestures can make your life easier. It adds another layer of customization to your device, and you do not need to fiddle around in the settings every time to get to certain accessibility actions. Even if you are not visually or hearing impaired, these accessibility features are handy for everyone.

Disclaimer

Technology is always changing. Rarely is there static tech for smartphones and desktops. Thus, the contents of this post are only valid at the time of writing. Blog posts older than six months may have directions incompatible with your device or OS. Hopefully, older post content will continue to work as advertised. Thank you for reading TechSavvy.Life for Technology at Work For You.

“Real work is completed in silence and strikes a chord in the minds of only a very few.”

CG Jung

That’s it. Please feel free to share this post! One way to share is via Twitter.

Just click the Tweet icon below. This will launch Twitter where you click its icon to post the Tweet.

Checkout TechSavvy.Life for blog posts on smartphones, PCs, and Macs! You may email us at contact@techsavvy.life for comments or questions.

Was this post helpful? We would love to hear your comments. Do you have a computer or smart device tech question? I will do my best to answer your inquiry. Just send an email to contact@techsavvy.life. Please mention the device, app, and version you are using. To help us out, you can send screenshots of the data related to your question.

The author’s Vietnam eBook on the “Battle for Tra Bong Vietnam: Events and Aftermath” can be accessed from a Kindle device or the Kindle App for a desktop or smartphone. The apps are free.

The author’s Vietnam eBook on the Battle for Tra Bong Vietnam: Events and Aftermath

Maximize Online Protection: The Power of Password Managers and Unique Access Codes

This post emphasizes the importance of strong, unique passwords and the use of password managers to enhance security. It highlights the risks of using common or personal information-based passwords and provides tips for creating and managing secure passwords.

RAYMOND OGLESBY @RaymondOglesby2
August 13, 2024 -9 minutes read time

This is for devices using passwords. Screenshots are from iPhone 14 Pro running iOS 17.5.1+

If you are still using “qwerty” or “starwars” as a password, you should stop doing this. Let’s find out what makes a bad password, why you should care, and how to make a good one.

Don’t have the password to get into your bank account? You are out of luck unless you can trick the bouncer into telling you the password is “kangaroo.” A simple password like that would be a terrible choice to protect your access to a bank site. And yet, chances are good you are using something just as bad, because stronger passwords are too hard to remember.

The only safe way to store proper passwords is in a password manager. If you are not using one, you probably rely on a highly crackable password like “baseball” or “12345”, or you have memorized one complex password, like “Jazz2day4Me!” and use it everywhere. Password security is no small matter. Given the enormous risk, you need to keep your passwords safe.

Even the best password manager does not guarantee the safety of your accounts; not if you use it to store the same old, tired passwords. You have to switch out your old and weak passwords for new and stronger ones.

Once you have replaced all your lame passwords with strong, unique ones, you can relax, at least until a data breach forces a change. The National Institute of Standards and Technology (NST) no longer recommends changing passwords every 90 days. NIST now recommends using long phrases like “Correct-Horse-Battery-Staple” and changing them only when necessary. If you have terrible passwords, “when necessary” means right now.

Passwords 1
Bad passwords

Just what makes a bad password? Let’s look at some of the attributes of terrible passwords, and then some pointers on improving them.

Every few months a news outlet posts a list of the worst passwords. We see a lot of easy-to-type options, like“12345” and “qwerty”. Easy for you to type? Sure. But also easy for hackers to crack. Other common (and poor) passwords consist of simple dictionary words, like “baseball”, “monkey”, and “starwars” in the list of worst passwords. These, too, are easy to crack.

A few of the best password managers (tap or click a button to view):

Some secure websites lock down after a given number of wrong password attempts, but many do not. For those with no bad guess lockout, hackers can cross a list of email addresses with a list of popular passwords and set up an automated process to keep trying combinations until they get in.

A properly secured website does not store your password anywhere. Instead, it runs the password through a hashing algorithm, a one-way encryption. The same input always produces the same output, but there’s no way to return to the original password from the resulting hash. If the password you type hashes to the same one that’s stored, you gain access. Even if hackers capture the site’s user data, they do not get passwords, just hashes.

But smart hackers can crack weak passwords if they know the site’s hashing function. They start by running a huge dictionary of common passwords through the hashing function. Then they look for the resulting hashes in the captured data. Each match is a cracked password. Sites with the best security enhance the hash function with password salting, which makes table-based cracking impossible, but why take the risk? Just stay out of the dictionary.

What about this perfect password: 1qaz2wsx3edc4rfv. You just “type” it by sliding a finger down four slanted columns of the keyboard. You think it’s so perfect, that you use it everywhere. And that is a big mistake.

Hardly a week goes by without news of a breach at some company or website, exposing thousands or millions of usernames and passwords. Smart victims change their passwords immediately. Those who ignore the problem may find themselves locked out of their accounts after the hackers have reset your passwords.

Those hackers know that all too many people recycle their passwords. Once they find a working username and password pair, they try the same credentials on other sites. You may not be so worried about losing access to your old Dropbox account, but if you used the same login on your bank’s website, you are in big trouble.

Passwords 2
Using the same credentials on websites

It gets worse. If someone else takes control of your email account, they can lock you out by changing the password. Then they can break into your other accounts by having a password reset link emailed to that account. Worried yet? You should be!!!!

Using personal information as the basis for your passwords is awfully tempting, but it’s a bad idea. Whether your dog’s name is Fifi or Khaleesi, that name probably appears in the dictionaries hackers use for brute-force attacks. Other possibilities such as the initials and birthdate of a family member probably will not fall to a brute-force attack. If someone wants to hack your account specifically, that personal data can fuel a trial-and-error guessing attack.

Do not think for a minute that your personal details are private. There are dozens of sites people can use to find details about anybody: address, birthdate, marital status, and more. Your social media posts can be another source of personal info, especially if you have not properly secured your accounts. A determined hacker (or a nosy neighbor) can probably guess any password you build based on your data.

If you are not using a password manager, you have surely experienced forgetting the password for a site. It’s all too common. That is why virtually every login page includes a “Forgot your password?” link. Some sites send a reset link to your email address, while others let you reset the password after answering your security questions. And that opens a back door to anyone wanting to hack your account.

Most sites offer abysmal options for security questions like:

  • What is your mother’s maiden name?
  • Where did you go to high school?
  • What was your first job?

As noted, your personal life is an open book to anyone with internet searching skills. When possible, ignore the preset questions. Create your own question, with a unique answer you will always remember but nobody else could guess.

It’s harder when the site does not let you define your own questions. In that case, your best bet is to use a memorable answer that’s a total LIE like:

  • My mother’s maiden name is Fauci.
  • I went to school at More Science High School.
  • For my first job, I was a linotype operator.

There is an element of risk since you might forget which lie you chose. We suggest storing these oddball answers in the iPhone Notes app or on Google Drive.

We hope we have convinced you that using common passwords is a rotten idea, as is building passwords from personal information. Even the best strong, random password becomes a liability if you use it everywhere. If you are ready to spring into action, here are some starting points:

  • Use a password manager
  • Switch to a better password manager
  • Remember an extremely secure master password for your password manager and keep it on another app. Better yet, just remember the master password.
  • Take advantage of a random password generator to upgrade your old, bad passwords
  • You could even create your own random password generator in Excel
  • Enable multi-factor authentication wherever available

If a secure site does not take care of security, you could still lose that site’s credentials to a data breach, but by making all your passwords long, strong, and unique, you can rest assured that you have done everything you can to protect your online accounts from password-based attacks.

Passwords 3
Risky password behavior

You may want to switch to using Passkeys or Passphrases.

Source: PC Mag

Disclaimer

Technology is always changing. Rarely is there static tech for smartphones and desktops. Thus, the contents of this post are only valid at the time of writing. Blog posts older than six months may have directions incompatible with your device or OS. Hopefully, older post content will continue to work as advertised. Thank you for reading TechSavvy.Life for Technology at Work For You.

“Try and keep on trying until that which seems difficult becomes possible and that which seems only possible becomes habit and a real part of you.”

Dieter F Uchtdorf

That’s it. Please feel free to share this post! One way to share is via Twitter.

Just click the Tweet icon below. This will launch Twitter where you click its icon to post the Tweet.

Checkout TechSavvy.Life for blog posts on smartphones, PCs, and Macs! You may email us at contact@techsavvy.life for comments or questions.

Was this post helpful? We would love to hear your comments. Do you have a computer or smart device tech question? I will do my best to answer your inquiry. Just send an email to contact@techsavvy.life. Please mention the device, app, and version you are using. To help us, you can send screenshots of the data related to your question.

You can access the E-book from a Kindle device, or the Kindle App for a desktop or smartphone. The apps are free.

The author’s Vietnam eBook on the Battle for Tra Bong Vietnam: Events and Aftermath

Discover How to Use Apple Indoor Maps on iPhone and iPad

Apple Maps now offers indoor maps for certain malls and airports, accessible through the app on iPhone and iPad. This feature eliminates the need for physical maps, allowing users to easily navigate these indoor spaces. By following specific steps within the Maps app, users can view indoor locations and access additional details.

RAYMOND OGLESBY @RaymondOglesby2
July 23, 2024 – 5 minutes read

This is for the iPhone and iPad using Apple Maps. Screenshots are from iPhone 14 Pro running iOS 17.5.1

For certain malls and airport locations, Apple has indoor maps viewing directly from the Maps app. You will love this feature because it allows you to figure out where you are without locating a directory or physical map somewhere inside the location. Let’s explore this feature.

First, open Maps on your iPhone. Refer to the below page:

Indoor Maps 1
Accessing the Maps app

Next, tap the Search box and type in the name of the airport or mall. See the below image:

Indoor Maps 3
Selecting the Search box

Now, tap it or swipe up to access the menu options until you see the location you want and tap it. See the following image:

Indoor Maps 4
Selecting your search criteria

Next, depending on what map you are looking at, you will see options for various stores and/or locations within the building. Tap one of the options to see it plotted on the map. Refer to the below image:

Indoor Maps 5
Search menu options

Now, you will see all the gates, shops, or other type of location you selected. For example, we are accessing the Charlotte Douglas International Airport airport gates. See the below image:

Indoor Maps 5
Selecting Gates for the airport

Next, swipe up for a list of all locations. See the following image:

Indoor Maps 6
Selecting aGate from the listing

Now, when you tap a location, it will get larger on the map, making it easier to find. Refer to the below image:

Indoor Maps 7
Your highlighted gate

For a 2024 Apple Indoor Maps listing, tap here.

And that’s how you view indoor maps! Apple is constantly updating its inventory of indoor maps, so hopefully, we will have access to even more of them in the future.

Disclaimer

Technology is always changing. Rarely is there static tech for smartphones and desktops. Thus, the contents of this post are only valid at the time of writing. Blog posts older than six months may have directions incompatible with your device or OS. Hopefully, older post content will continue to work as advertised. Thank you for reading TechSavvy.Life for Technology at Work For You.

“You will either step forward into growth or you will step back into safety.”

Abraham Maslow

That’s it. Please feel free to share this post! One way to share is via Twitter.

Just click the Tweet icon below. This will launch Twitter where you can tap the Post icon to post the Tweet.

Checkout TechSavvy.Life for blog posts on smartphones, PCs, and Macs! You may email us at contact@techsavvy.life for comments or questions.

Was this post helpful? We would love to hear your comments. Do you have a computer or smart device tech question? I will do my best to answer your inquiry. Just send an email to contact@techsavvy.life. Please mention the device, app, and version you are using. To help us out, you can send screenshots of your data related to your question

You can access the E-book from a Kindle device, or the Kindle App for a desktop or smartphone. The apps are free.

The author’s Vietnam eBook on the Battle for Tra Bong Vietnam: Events and Aftermath

How to Enable Screen Distance on iPhone/iPad

The iPhone/iPad now has a hidden feature called Screen Distance, found in iOS/iPadOS 17 or higher, designed to reduce eye strain by detecting when the device is held too close to your face.

RAYMOND OGLESBY @RaymondOglesby2
June 25, 2024 – 4 minutes read time

This is for the iPhone/iPad using iOS or iPadOS 17 or greater. Screenshots are from iPhone 14 Pro running iOS 17.5.1

The iPhone/iPad has a hidden display feature introduced in iOS/iPadOS 17 that everyone with an iPhone/iPad should start using. Screen Distance is designed to help reduce eye strain caused by holding your phone too close to your face. Let’s explore this feature.

Viewing something like a device or book too closely for an extended period can increase eye strain and the risk of myopia. The Screen Distance feature in Screen Time uses the TrueDepth camera to detect when you hold your iPhone/iPad closer than 12 inches for an extended period and encourages you to move it farther away. Screen Distance can help children engage in healthy viewing habits that can lower their risk of myopia and can give people of all ages the opportunity to reduce digital eyestrain.

First, open Settings. Refer to the below image:

Screen Distance 1
Accessing Settings

Next, tap the Screen Time option. See the below image:

Screen Distance 2
Selecting the Screen Time option

Now, tap the Screen Distance option. See the following image:

Screen Distance 3
Selecting the Screen Distance option

Next, an informational screen will be displayed about Screen Distance. Just tap the Continue button. Refer to the below image:

Screen Distance 4
Notification screen

Now, another informational screen about “How Screen Distance Works” will be shown. Once again, tap the Continue button. See the below image:

Screen Distance 5
Notification screen

Next, toggle the Screen Distance to ON. See the following image:

Screen Distance 6
ToggleScreen Distancer to ON

If you are too close to your iPhone/iPad, it will pop up a notification splash screen interrupting whatever you are doing at the moment. Refer to the below image:

Screen Distance 7
Screen Too Close notification

To readjust the Screen Distance feature, move your iPhone/iPad at least 12 inches from your face. A new notification splash screen will appear allowing you to proceed by tapping the Continue button. See the below image:

Screen Distance 8
Screen Distance notification screen

Once you activate this feature, your iPhone/iPad Face ID sensors take about five minutes to work.

Considering how easy it is to hold your phone up to your face without thinking about it, this feature can be really handy for people who want to help reduce the strain on their eyes. 

Of course, if you have trouble reading, you may find that Screen Distance is more annoying than helpful, especially if you prefer to keep your phone close to your face. If so, go back and toggle the Screen Distance feature to OFF.

Disclaimer

Technology is always changing. Rarely is there static tech for smartphones and desktops. Thus, the contents of this post are only valid at the time of writing. Blog posts older than six months may have directions incompatible with your device or OS. Hopefully, older post content will continue to work as advertised. Thank you for reading TechSavvy.Life for Technology at Work For You.

Being realistic is the most common path to mediocrity.

-Will Smith

Congratulations, you are finished. Please feel free to share this post! One way to share is via Twitter.

Just click the Tweet icon below. This will launch Twitter where you click its icon to post the Tweet.

Checkout TechSavvy.Life for blog posts on smartphones, PCs, and Macs! You may email us at contact@techsavvy.life for comments or questions.

Was this post helpful? We would love to hear your comments. Do you have a computer or smart device tech question? I will do my best to answer your inquiry. Just send an email to contact@techsavvy.life. Please mention the device, app, and version you are using. To help us out, you can send screenshots of your data related to your question.

You can access the E-book from a Kindle device, or the Kindle App for a desktop or smartphone. The apps are free.

The author’s Vietnam eBook on the Battle for Tra Bong Vietnam: Events and Aftermath

How to Find Out Who Is Calling You

This post discusses how to identify legitimate calls and avoid scammers, addressing phone verification, spoofed numbers, and web searching. It provides options like reverse phone lookup websites and tools like WhoCallsMe, Spy Dialer, PeopleFinders, and USPhoneBook. It also suggests utilizing mobile carrier solutions, reporting to the FTC, and the National Do Not Call Registry to combat spam calls.

RAYMOND OGLESBY @RaymondOglesby2
June 11, 2024

This is for any browser on a desktop, laptop, or smartphone. Screenshots are from Google Chrome on Windows 10

The phone rings and it’s a number you do not recognize. Or perhaps an unknown number shows up in your missed calls. You are curious but do not want to pick up or call back if it’s a telemarketer or scammer. Instead of playing robocall roulette let’s explore five ways to see who is calling before you engage.

You may have noticed that America has a problem with scam calls. Scammers took $10 billion from unsuspecting victims in 2023, and it’s hard to see the problem going away anytime soon. If you get a call, there are a few ways to tell if it’s legit or not.

  • What does the phone say? When a call comes in, look for a displayed number and location. If your phone is not showing any information and says something like Unknown, chances are there’s a scammer on the other end. Anyone can hide their number, but it’s best to let this one go to voicemail and call back if it’s someone you know. If the phone says Scam Likely, it’s typically correct; just ignore the call.
  • Look for verification. Carriers have started verifying phone numbers when you receive a call. Google’s phone app also adds a badge on incoming calls that can be attached to a business. Unfortunately, this does not verify every call from a legitimate business or weed out legitimate businesses that use robocalls.
  • Watch out for spoofed numbers. Have you ever gotten a call from what looks to be your own phone number, only it’s a few numbers off? Do not pick those calls up; scammers like to spoof phone numbers and trick you into picking up. They think you are more likely to pick up if the call is from your area code or someone you know.

Note! We recommend ou not click or tap on any icon off the main screen. These buttons launch web sites that may introduce malware or be blocked by your browser security. Also, any screen that has flashing items, immediately exit the screen.

If you click or tap on a button that starts a scanning process for addresses,emails, public information, criminal records, etc., the process will take several minutes. On the desktop, you can stop the process by hitting Cntl-Alt-Del keys, then select Task Manger. Next, right=-click on your browser entry and select End Task. Your browser will exit stopping the scanning process.

If you want to quickly know whether a caller is legit or a scammer, do a quick web search. As a rule of thumb, if the search results are primarily reverse phone lookup websites, it’s safe to say other people have received unwarranted calls from that same number and are reporting it to warn others. Refer to the below image:

Calls You 1
Search the web

Speaking of reverse phone lookups, if you want to do some digging about a certain phone number, many websites can help you. You usually have to pay to get any worthwhile information, but there are a few tools that can help you for free. Even though they are free if you want additional information about the phone number, the sites charge for their service.

At WhoCallsMe, users can report their experiences with specific phone numbers. Enter a number and the website will tell you where the area code is from. You can then enter your own report or view what others say about it. See the below image:

Calls You 2
WhoCallsMe main screen

Spy Dialer allows you to search for phone numbers, names, addresses, and emails. Enter a phone number, then choose if you want to look up any linked names or photos, listen to the number’s outbound voicemail, or confirm if the number is spam or not. Spy Dialer can tell you with whom the number is registered, their general location, and whether or not the number has been reported as spam before.

For more information, click Phone Details to see how long the line has been in service and if the number is spoofed. Choose Hear Voicemail to get the caller’s outbound voicemail, if available. You can click Report Call to file a complaint with Spy Dialer.

We recommend this site over the others because it’s faster and offers more information. See the following image:

Calls You 3
Spy Dialer main screen

PeopleFinders allows you to look up a phone number, name, address, or email. Enter a phone number into the search bar to get the caller’s general location, carrier, and phone type. More revealing information, such as the caller’s full name and address, is hidden requiring a fee. Refer to the below image:

Calls You 4
PeopleFinders main screen

You can look up phone numbers, names, and addresses at USPhoneBook, though this works better for identifying individuals rather than businesses. Enter a number to find the person connected to it. The site will display a list of people who may be related to the person. You can then mark the number as safe or spam. Keep in mind that these listings can be outdated.

Click Get Details to view extra information about the person. This will include their age, current (and former) addresses, phone numbers associated with them, a list of relatives and associates, and even related email addresses. See the below image:

Calls You 5
USPhoneBook main screen

One option is to look at your mobile carrier’s anti-spam solutions for stopping spam calls and robo texts. Additionally, apps likeRoboKiller and Truecaller help keep the spam callers at bay. You can also report unwanted calls to the FTC and register your number with the National Do Not Call Registry, though those wishing to do you harm will undoubtedly ignore this. See the following image:

Calls You 6
National Do Not Call Registry main screen

Disclaimer

Technology is always changing. Rarely is there static tech for smartphones and desktops. Thus, the contents of this post are only valid at the time of writing. Blog posts older than six months may have directions incompatible with your device or OS. Hopefully, older post content will continue to work as advertised. Thank you for reading TechSavvy.Life for Technology at Work For You.

. Motivation is what gets you started. Habit is what keeps you going.

Jim Rohn

You are finished. Please feel free to share this post! One way to share is via Twitter.

Just click the Tweet icon below. This will launch Twitter where you click its icon to post the Tweet.

Checkout TechSavvy.Life for blog posts on smartphones, PCs, and Macs! You may email us at contact@techsavvy.life for comments or questions.

Was this post helpful? We would love to hear your comments. Do you have a computer or smart device tech question? I will do my best to answer your inquiry. Just send an email to contact@techsavvy.life. Please mention the device, app, and version you are using. To help us out, you can send screenshots of your data related to your question.

You can access the E-book from a Kindle device, or the Kindle App for a desktop or smartphone. The apps are free.

The author’s Vietnam eBook on the Battle for Tra Bong Vietnam: Events and Aftermath

How to Spot Phishing Attempts

Phone and email scammers are running rampant. Here are some real-life phishing lures and how to stop scammers in their tracks.

RAYMOND OGLESBY @RaymondOglesby2
November 14, 2023

This is for devices using Text Messaging and Email.

Phone and email scammers are running rampant. Here are some real-life phishing lures and how to stop scammers in their tracks.

Recently, Google warned that hackers were sending phishing emails to YouTube creators, offering antivirus software in exchange for a review on the channel. The antivirus was, in fact, malware designed to steal passwords and browser cookies, which can also hold login credentials.

Identifying legitimate contact is difficult in the age of frequent phishing attempts. Recently after helping a friend figure out whether an email purporting to be from Facebook was a phishing lure. In the end, that email turned out to be a real marketing message from Facebook, but he had to go through several steps to determine the message’s legitimacy. Even we have difficulty determining the authenticity of messages from Facebook and other companies.

Facebook keeps a list of verified correspondence in the account area of your profile, so it’s easy to match emails you receive in your inbox with the messages you see from Facebook in your account. But what if you want to verify that an email came from someone you know and contains safe links? The US Federal Trade Commission offers a few steps you can take to stay safe:

  1. Look at the From email address. If you do not recognize the address or the sender, think twice about opening any links contained within the email.
  2. Spot a generic greeting. A business email usually will not begin with a casual greeting such as, “Hi Dear.” An email from a friend usually will not spell your name wrong or address you with an honorific like “Mr., Mrs., or Miss.”
  3. Look at the link URLs. Mouse over links before you click on them. Your browser will reveal the web address for each one. If the link looks suspicious (for instance, a link purporting to be from Netflix takes you to an entirely different domain), do not click on it! Delete the email or report it as spam and move on.
  4. Be wary of any emails that invite you to click on a link, whether to update your payment details, update your account information, receive a coupon for free stuff, or examine an invoice you are not expecting.

Our son is a cyber severity expert. He says, “Don’t click that link”.

Even the most vigilant email user can be caught unaware of a malicious link in an email. Add extra layers of protection to your online life so you can mitigate the damage done by scammers:

  • Use security software. The best antivirus and security suites have phishing protection built right in. Set the software to update automatically and run in the background to protect you from phishing attempts.
  • Use multi-factor authentication everywhere you can online. Even if a scammer manages to get a hold of your username or password, if you set up multi-factor to be something you have (a hardware security key or an authenticator app passcode), or something you are (a scan of your fingerprint, retina, or face), it’s harder for the bad guys to log into your accounts.
  • Back up your data. Copy your important documents and information regularly and store them on an external hard drive or with an online backup or storage service.

Recently there have been SMS text messages using phishing attempts, also known as “smishing.” Here are some examples of smishing:

Phishing 4
Phishing text messages

If you are not careful, these types of messages may fool you into giving up valuable information about yourself or downloading malware onto your phone.

Both messages came from an unknown phone number. Also, both requested action related to a finance-related problem, and both contained suspicious links. The first message is from an unknown company about a product we never purchased, and the use of the bit.ly link shortener is a common way for smishers to encourage their victims to click. The Citibank message is worrying because the link address is slightly off, featuring a dash instead of a period between “support” and “citi.”

For years, security researchers have noted that SMS spam could be curtailed by mobile carriers if they stopped offering unlimited texting plans. Until that happens, the best way to fight back against mobile spam in the United States is to forward the messages to short code SPAM (7726).

Here are a couple of email phishing attempts. The first one is an email from a company we do not use and with a weird link.

Phishing 1
Phishing email on desktop

The second one has links that are way too long (only partially displayed) and a white dotted line at the top, and we did not request their help.

Phishing 3
Phishing email on desktop

Technology is always changing and rarely is there static tech for smartphones and desktops. Thus, the contents of this post are only valid at the time of writing. Blog posts older than six months may have directions incompatible with your device or OS. Hopefully, older post content will continue to work as advertised. Thank you for reading TechSavvy.Life for Technology at Work For You.

Failure is an option here. If things are not failing, you are not innovating enough.

Elon Musk

That’s it. Please feel free to share this post! One way to share is via Twitter.

Just click the Tweet icon below. This will launch Twitter where you click its icon to post the Tweet.

Checkout TechSavvy.Life for blog posts on smartphones, PCs, and Macs! You may email us at contact@techsavvy.life for comments or questions.

Please feel free to leave a comment. I would love to hear from you. Do you have a computer or smart device tech question? I will do my best to answer your inquiry. Just send an email to contact@techsavvy.life. Please mention the device, app, and version you are using. To help us out, you can send screenshots of your data related to your question.

You can access the e-book from a Kindle device, the Kindle App for the desktop or smartphone, which is a free app.

The author’s Vietnam eBook on the Battle for Tra Bong Vietnam: Events and Aftermath