DMG Designs Editor's Review
ABI sequencing files of subcloned single molecules and the corresponding reference sequence. There is a known problem with ZIP files created on MAC. Either use another program for zipping (like CleanArchiver) or prepare ZIP files on a PC. CleanArchiver is a simple and nifty archiving utility for OS X. It supports gzip, bzip2, zip, 7zip, rar and DiskImage. Also it can convert filename.
DMG Designs is an application that creates or converts disk images.- CleanArchiver di Sopht Square consente di comprimere i file mentre non compreso il sistema di file che utilizzano Mac, come il. DSStore e file di icone personalizzate.-questi file non sono utilizzati su altri tipi di sistemi operativi, come Microsoft Windows. CleanArchiver comprime i file usando gzip.
- CleanArchiver is a simple and nifty archiving utility. It supports not only standard archive types such as gzip, bzip2, and zip, but also compressed Disk Image.
This application is similar to DMG Packager, another tool that can give to your distribution packages the professional look. It can do the same tasks as DMG Packager, and it can do some things that are unsupported by this one: it can use a custom icon for the mounted volumes, and it has built in a disk convertor. Unlike DMG Packager, DMG Designs also supports the encryption of the disk images and the image conversion.
On the other hand, DMG Packager supports archive creation, a feature that you won't find in DMG Designs. Most of the archive formats supported by DMG Packager, are also supported by a free tool, CleanArchiver. CleanArchiver also supports the creation of DMG images, but it has just a few features. Those features are enough for regular users though.
Since I started talking about alternatives, and programs that can do almost the same thing, there is another free alternative to this product, CreaDMG. This one is also appropriate for smaller projects.
The interface of this product has an interesting design. Is both eye candy and ergonomic at the same time. There is a side menu that lets you pick your desired operation. Unlike other applications, this menu has graphical buttons. They don't have any text on them, but they look pretty intuitive.
The creation engine supports various customization options of your output disk image. The most interesting part is the possibility to customize very well the layout of the window that would appear in Finder when you mount the image.
The supported image types are Read+Write or Sparse. You can't find in this application the support for read-only disk images. You can pick a file system that can be either HFS, HFS+, HFS+J, or UFS.
The conversion engine supports some features that in a weird way are not available to the creation engine. You can find here new features such as the type of the compression, the support for the segmentation of the resulted image, the possibility to build Internet Enabled images, and the support for adding a SLA (Software License Agreement). I still wonder why these features aren't available directly from the creation engine.
The last button from the side menu gives you access to the log of the program. The log window can give you precious information such as the error reporting in case of failure, or it can give you information such as the MD5 hash of the resulted image. If you lose this hash, you can calculate it again with a dedicated tool, MD5.
Pluses: it gives you various features that can customize the layout of your distribution package, it reunites some useful tools that usually are available in multiple equivalent applications, it has a built in conversion engine. Another good thing is the support for dual core processing. This is one of the few applications that uses the whole processing power of your CPU.
Drawbacks / flaws: some features that are available in the conversion engine are not available into the creation engine. This makes the applications a little inconsistent. The support for splitting the disk image in multiple volumes is implemented but I couldn't make not even a single split image with this program. No matter if there is a large file into the image, or a lot of small files, it does the same thing: it splits the output image in many small volumes. When it reaches the number of 250 volumes, the process fails with the error: 'convert failed - Too many open files'. The side menu is useful, but even though the icons are quite intuitive, the applications doesn't give you any option to enable some text labels for these buttons.
In conclusion: the inconsistency of the interface can make you lose useful time if you would like to include into your image some elements that are available only in the conversion mode. I didn't see any beta sign near this application, so there's no excuse for the dumb behavior when trying to split an image. Chop DMG can do a better job in splitting images into multiple volumes.
Clean Archiver
version reviewed: 1.1.1For most people, technology is like a car — they just want to use it, they don't want to be an engineer.
CradlePoint PHS300 Per...Best Price: $19.99Buy New $71.99(as of 05:00 EST - Details)
Here, I'm going to cherry pick the easiest and most useful ways I know to communicate and use the internet privately. My earlier article 'Practical Internet Privacy' was pretty low-tech; this one is as close to no-tech as possible.
Techies might quibble, but useable low to medium strength privacy is better than none. Also, the 'security through obscurity' factor should not be dismissed — who is going to spend hours hacking your difficult but not impregnable email?
But I will also add some easy but optional extra strength privacy tips where relevant.
Anything from your home broadband carries with it the internet equivalent of Caller Line ID, so one privacy key is to make use of the many open, free Wi-Fi 'hotspots.' Or, along with a disposable prepaid SIM card, you can even have your own mobile Wi-Fi hotspot (alt.). There is some info at the end on how to use your home internet privately.
Easy Voice Call Privacy
Apple iPod touch 8 GB ...Check Amazon for Pricing.
For easy call privacy get an iPod Touch, the brand new model is just over $200 and has a built in microphone — optional earphones with remote and mic are under $20.
Then, choose one or both of these apps:
With the free Skype app, you can call other Skype users privately and with 'SkypeOut' credit, call regular numbers. But first, set up a new Skype username — preferably not from your home internet. Luxembourg-based Skype may or may not be able to piggyback a username to monitor calls, but otherwise your call is private.
The 'Acrobits Softphone' app is about $10 at the iTunes store ('Bria' is a good app too).
With this, you can make and receive regular phone calls, but you will also need an internet phone account — the voice equivalent of an email provider (try Link2Voip). You can then make outgoing calls, but a regular 'Direct Inward Dial' (DID) phone number is usually an optional extra — or try a free IPKall number to start.
Instead of an iPod Touch, iPhone or iPad, you could also use a laptop and headset. To do this, both Mac and Windows users can install the free Zoiper Classic 'soft-phone' and/or Skype.
Or, want something private but zero-tech for Skype only? Get an Ipevo Skype Wi-Fi phone, just punch in your new Skype username and sit in a quiet corner of any internet cafe.
Extra Strength Privacy Tips:
- Create a new iTunes account and register the iPod Touch anonymously by using iTunes vouchers
- Use generic personal info when signing up
- Sign up to the call provider using a money order
- Buy SkypeOut credit privately using PayByCash.com.
Easy Document Privacy
This is really easy, in just three or four clicks. First, you need to pre-share a password with the recipient, and then all you need is a secure 'file archiving' program.
For Windows, first install the free program 7-Zip. Then just right click on a document: Move the cursor to '7-Zip,' click 'Add to Archive,' choose Archive Format>Zip and under Encryption enter your password — or just follow this easy video tutorial. Clicking OK will create a very secure, password protected 'zip' file.
Cleanarchiver Mac Os X
IPEVO S0-20 WiFi Phone...Check Amazon for Pricing.
For Windows recipients only, choosing '7z' for the archive format and ticking 'Create SFX Archive' will create a self contained file — so no unzip software is needed at the other end, just the password.
Mac users can also read and create secure zip archives by using BetterZip or the free CleanArchiver.
Extra Strength Privacy Tip: Choose 'AES-256' encryption type — impregnable but less compatible.
Easy Email Privacy
One way to privately pre-share a password by email is to use the answer to a question you both know, but others would not.
You could then just email one of the above secure zipped documents as an attachment — but in order to stay completely off the record, use what is called an email 'dead drop':
First create a new free webmail account, preferably with a secure email provider in another country. (Try Mailvault, Hushmail, PrivacyHarbor).
Then, instead of sending an email, you can both access the same email address — saving drafts or editing the same draft. A new password can be suggested at any time, for the other person on their next login to implement. When the email/draft exchange is over, the last one out deletes everything.
Extra Strength Privacy Tips:
- Password protected documents can also be transferred as attachments via an email dead drop.
- Some webmail services can list previous login details, to easily spot an intruder.
Zoom 4506 3G Wireless-...Best Price: $49.95Buy New $58.99(as of 07:30 EST - Details)
Easy Surfing Privacy
Airports, military bases and other public internet facilities often spy on users and/or block websites — especially hotbeds of dissent like LewRockwell.com.
One easy way round this is to use a website translation service like Bing Translator. By translating both from English and to English, the target site is fully accessible, but only the translator's web address is visited. For example, here is LRC.
Easy Online Shopping Privacy
Just create a new Amazon account using widely available Amazon Gift Vouchers and personal info of your choice — only, make sure the physical address works…. and don't look surprised when the delivery guy asks for John Smith…
Easy Home Internet Privacy
The idea is simple — a bit like making a telephone call to your work switchboard from home and having them call a third party and then patching you through.
Your home phone bill shows only a call to the switchboard; the third party caller ID shows only a call coming from the switchboard; the switchboard phone bill shows only a call to the third party. To mix it up further, lots of others are using the switchboard at the same time.
Clear Archive Log
A 'VPN' (Virtual Private Network) is a private internet switchboard — you stay invisible because all your activity goes through this, making you appear to be coming from the VPN location.
On an iPhone, iPad, or iPod Touch there's no need even to install software, as it's already built in. On a regular computer, the VPN provider's instructions will make it easy.
You will need to pay for a subscription. Try Perfect-Privacy — they are tried and trusted, have servers all over the world, keep no logs, and the service will work with the iTouch/iPhone/iPad as well as computers. Or, try Cryptohippie with their businesslike customer service — though for regular computers only.
Extra Strength Privacy Tip: Just like getting a phone number from directory enquiries, the internet has what is called a 'Domain Name System' (DNS). Choose a VPN service that has a solution to the 'DNS leaks' that can reveal sites you visit on Windows, Linux and sometimes Mac computers.
Final Thoughts:
Using either a public Wi-Fi hotspot or a VPN service means you won't leave a trail to your door when using the internet.
Every once in a while, to illustrate a point in answer to a privacy question, I have taken a couple of minutes to ID an email sender. They are usually shocked when I tell them their workplace, their home address and their age, as well as their friends and interests. It doesn't even require special tools, just an internet search starting with the unique home internet number or 'IP address' embedded in their email.
So bloggers, dissenters, whistleblowers, offshore accountholders — beware, and get some easy internet privacy.
Clear Archive Attribute
September 6, 2010