The Apple Pips

Inside All Apple Products

Tag: MacOs (Page 1 of 67)

How to export your shot on iPhone HEIF images as JPEGs using Photos for Mac

For those who prefer to copy their iPhone images over to a Mac or Windows PC via the USB transfer method, our Tutorial series has explained how to convert HEIF-encoded media to the JPEG format using Apple’s stock Preview app or a free app like iMazing HEIC Converter.... Read the rest of this post here

"How to export your shot on iPhone HEIF images as JPEGs using Photos for Mac" is an article by
Make sure to follow us on Twitter, Facebook, and Google+.

Israeli class action suit over Meltdown & Spectre targets Apple, ARM and Intel

In spite of assurances from Intel that software fixes for the recently publicized vulnerabilities in CPU designs would not result in substantial performance penalty, Apple has nevertheless found itself in the middle of a legal brouhaha over Meltdown and Spectre over in Israel.... Read the rest of this post here

"Israeli class action suit over Meltdown & Spectre targets Apple, ARM and Intel" is an article by
Make sure to follow us on Twitter, Facebook, and Google+.

Rip DVDs with VLC on Your Mac

VLC is a powerful and well-loved application. You’ve probably used it to play media files on your Mac for when QuickTime doesn’t work properly. However, few users realize it can do more than just play files. If needed, you can rip DVDs to your Mac with VLC. This allows you save non-copy protected DVDs to your computer as video files, either for archiving or watching without the disk. For folks with big home entertainmenst systems or a home media server, this is a great tool to breathe new life in to older content.

In general, ripping DVDs is illegal provided you don’t circumvent copy protection. Some DVDs do have copy protection, which others do not. While there are programs out there for removing DRM from DVDs, note that ripping DVDs with VLC won’t defeat any kind of DRM, and it can be a little buggy at times. If you want a more robust experience, Handbrake is an excellent alternative app for ripping even copy protected DVDs. But if you need something quick you can do with software you already have, you can rip DVDs with VLC.

Rip DVDs with VLC

Before we get going, download and install VLC from the developer’s website, if you don’t already have it. Then put a DVD in your Mac’s DVD reader.

1. Choose “Open Disc…” from the “Media” menu.

2. Click the drop-down arrow next to the “Play” button in the lower-right. Choose “Convert” from the drop-down menu.

3. In the next window we can choose some conversion options for our ripped video file.

4. You can click the drop-down box next to “Profile” to select from the available options. If you want to play around with some more advanced options, check out the section below.

5. Click the “Browse” button to choose a destination and name for your file.

6. Click the “Start” button in the lower right to begin ripping the file.

Rip DVDs with VLC: Advanced Options

When you rip DVDs with VLC, you can also specify a format for the ripped file. You can select an encapsulation format which sets the file extension as well as the video and audio codecs. You can even capture subtitles, so long as you work with an encapsulation method that supports it.

All these advanced options are available in the “Convert” dialog box which you’ll encounter after step two above.

1. If you want to make precise adjustments to your encoding format, click the small new document icon next to the Profile drop down to reveal a subset of advanced options. You can also click the adjacent wrench icon to adjust an existing profile rather than create a new one. This exposes a wide array of advanced options.

2. Choose the encapsulation options for your new profile.

As you select different options, you’ll notice the “Features” section change to reflect the options available for that codec.

You might also see a small info box that pops up saying “muxer is not provided directly by VLC: it could be missing.” This means the encoding software is not bundled as part of VLC and will need to be provided separately.

3. Click the “Video codec” tab. Set the video codec for your new profile from the drop-down and make any adjustments necessary. You may need to tick the box next to “Video” to enable video capture before you can select any options.

4. Next, click the “Audio codec” tab. As with video, set the audio codec for the profile, making any tweaks that are necessary. You may need to tick the box next to “Audio” to enable audio capture before you can select any options.

5. If necessary, turn on subtitle capture for your DVD. This may or may not be available, depending on the encapsulation method you chose in step five.

6. Finally, give your new profile a name and click “Create.”

7. Select your new profile from the “Profile” drop-down menu. You’ll find it at the bottom, below all the other profiles.

8. Set a destination for your ripped file and click “Start.”


VLC isn’t the most powerful tool for ripping DVDs, but it can get the job done. It works well for things like preserving older video content on your hard drive, but it’s not perfect. If you do find bugs, especially with the advanced options, don’t be too surprised. Remember that this is open source software developed largely by volunteers, so functionality might not be as robust as professional-grade applications. If you do want a more robust option, the previously-mentioned Handbrake is a good choice. Apart fromt hat, you can use the above guide to create a digital file from any standard DVDs you might have.

You might also be interested in the following posts:

How to Record iPad Screen Videos

How Much C4 Will a Mac Pro Hold? [Video]

Getting Started with Terminal: Must-Know macOS Terminal Commands


The post Rip DVDs with VLC on Your Mac appeared first on Apple Gazette.

Safari Technology Preview 47 for Mac Release Includes Spectre Mitigations

Safari Technology Preview 47 for Mac Release Includes Spectre MitigationsApple on Wednesday released Safari Technology Preview 47, a new version of their experimental web browser, first released in March 2016. The browser allows developers and other interested parties to test features that may debut in future release versions of Safari.

The release includes bug fixes and feature improvements with an experimental implementation of the Storage Access API, updates to Service Workers, and improvements to Media, Rendering, Web Inspector, and the Clipboard API. (Via MacRumors)

The update also includes mitigations for the recently announced Spectre hardware vulnerability that affects Macs. Spectre fixes were also added to the release version of Safari in the supplemental update macOS High Sierra 10.13.2 released earlier this week.

Safari Technology Preview Release Notes

Release 47

Storage Access API

  • Enabled allowing requests from non-sandboxed <iframes>
  • Implemented frame-specific access in the document.cookie layer
  • Made document.hasStorageAccess() retrieve the current status from the network process
  • Refactored XPC for access removal to go straight from the web process to the network process

Service Workers

  • Added support for response blob given to fetch events
  • Changed extracting a body of type Blob to set the Content-Type to null instead of an empty string
  • Changed to use “error” redirect mode for fetching service worker scripts
  • Changed the Service Worker script fetch request to set the Service-Worker header
  • Changed Service Worker to not clean HTTP headers added by the application or by Fetch specification before Service Worker interception
  • Fixed the default scope used when registering a service worker
  • Fixed the Service Worker Registration promise sometimes not getting rejected when the script load fails
  • Fixed Service Worker served response tainting to keep its tainting
  • Fixed scopeURL to start with the provided scriptURL
  • Fixed self.importScripts() to obey updateViaCache inside service workers
  • Fixed Fetch handling to wait for the Service Worker’s state to become activated
  • Fixed SameOrigin and CORS fetch to fail on opaque responses served from a Service Worker
  • Fixed memory cache to not reuse resources with a different credential fetch option
  • Prevented searching for service worker registration for non-HTTP navigation loads
  • Supported Service Worker interception of a request with blob body


  • Enabled picture-in-picture from an inline element on suspend
  • Fixed playing media elements which call “pause(); play()” getting the play promise rejected
  • Implemented <iframe allow=”camera; microphone”>


  • Fixed elements animated on-screen that are sometimes missing
  • Fixed setting the fePointLights color
  • Fixed the color of the bottom right pixel of feDiffuseLighting
  • Fixed SVG lighting colors to be converted into linearSRGB
  • Updated the SVG use element’s shadow trees explicitly before the style recall

Web Inspector

  • Enabled the Canvas Tab by default
  • Improved open time performance when enumerating system fonts
  • Fixed Command-Option-R in the docked inspector causing Web Inspector to reload instead of the inspected page
  • Fixed the URL filter in the Network Tab to be case-insensitive like filter bars in other tabs
  • Fixed mis-sized waterfall graphs in the Network Tab after closing the detail view
  • Redesigned the waterfall popover showing timing data in the Network Tab table
  • Updated the Time column in the Network Tab table to include the total duration not just the download duration
  • Added an inline swatch for CSS variables in the Styles sidebar
  • Added support for typing a semicolon at the end of a value to move to the next property in the Styles sidebar
  • Enabled Command-S to save changes in the matching CSS resource in the Styles sidebar
  • Fixed selecting text in the Styles sidebar to not add new properties
  • Implemented clicking above the selector to prepend a new property in the Styles sidebar

Clipboard API

  • Fixed isSafari runtime check to enable custom clipboard types and clipboard data sanitization in Safari Technology Preview
  • Fixed not being able to paste images on Gmail
  • Reverted blob URL conversions in pasted contents for LegacyWebKit clients

Bug Fix

  • Avoided waking plugin process up unnecessarily

Users can either download the update from the Safari Technology Preview website, or if they already have the browser installed, they can download it via the Mac App Store. Full release notes for the update are available on the same website.

While the preview is intended for use by developers and advanced users, in order to provide Apple with feedback on the development of the Safari browser, it can be run side-by-side with the release version of Safari. The app doesn’t require a developer account to download and install. For more information, visit the Safari Tech Preview website.

Man charged in malware mystery that allegedly spied on Mac users for 13 years

Enlarge (credit: Chris Potter)

Early last year, a piece Mac malware came to light that left researchers puzzled. They knew that malware dubbed Fruitfly captured screenshots and webcam images and had been installed on hundreds of computers in the US and elsewhere, possibly for more than a decade. Still, the researchers didn't know who did it or why.

An indictment filed Wednesday in federal court in Ohio may answer some of those questions. It alleges Fruitfly was the creation of an Ohio man who used it for more than 13 years to steal millions of images from infected computers, as he took detailed notes of what he observed. Prosecutors also said defendant Phillip R. Durachinsky used the malware to surreptitiously turn on cameras and microphones, take and download screenshots, log keystrokes, and steal tax and medical records, photographs, Internet searches, and bank transactions. In some cases, Fruitfly alerted Durachinsky when victims typed words associated with porn. The suspect, in addition to allegedly targeting individuals, also allegedly infected computers belonging to police departments, schools, companies and the federal government, including the US Department of Energy.


The indictment, filed in US District Court for the Northern District of Ohio's Eastern Division, went on to say that Durachinsky developed a control panel that allowed him to manipulate infected computers and view live images from several machines simultaneously. The indictment also said he produced visual depictions of one or more minors engaging in sexually explicit conduct and that the depiction was transported across state lines. He allegedly developed a version of Fruitfly that was capable of infecting Windows computers as well. Prosecutors are asking the court for an order requiring Durachinsky to forfeit any property he derived from 13-year campaign, an indication that he may have sold the images and data he acquired to others.

Read 5 remaining paragraphs | Comments

Page 1 of 67

Powered by WordPress & Theme by Anders Norén