Are Your Bits Flipped?
Are Your Bits Flipped?


This book is no longer available for sale.

Are Your Bits Flipped?

Last updated on 2016-05-10

About the Book

Just as a single “flipped bit” in a piece of computer code can bring an otherwise reliable app crashing to a halt, a single misconception in your understanding of personal computing technology can cause all manner of problems — including lost data, wasted time, and constant frustration as you live and work in today’s increasingly digital world. In this unique title from Take Control, which is packed with little-known facts and debunked beliefs, tech expert Joe Kissell untangles common confusions surrounding the high-tech products and services we all rely on every day.

By eliminating your tech misconceptions, you’ll:

  • Avoid common errors that waste precious time or result in data loss.
  • Make decisions based on an accurate understanding of how things work.
  • Find yourself asking for — or paying for! — computer help less often.
  • Have clear explanations on hand when others ask you for help.
  • Better understand tech topics in the headlines — encryption, passwords, privacy, and more.
  • Make a stronger impression at a job interview, user group, or wherever your tech skills may be judged.

Some of the 16 chapters in this 190-page book are updated and expanded versions of essays originally published in TidBITS.

You’ll start thinking more clearly about:

  • Trust: Can you trust an online service like iCloud or Gmail, or a password manager?

  • Privacy: How do you evaluate your privacy when a Web site wants you to give it personal information? What if the site wants to track the way you use it? What if you want to store confidential data on it?

  • Fear: Should you worry about using Java or JavaScript, two computer languages that have little in common except their names?

  • Clicking: Why click twice when you can click once? Sort out once and for all what a single click versus a double click can accomplish rather than just clicking randomly like a teenager.

  • Opening apps: Are you in the shockingly large group of people who spend too much time on the mundane action of opening apps?

  • Cloud accumulation: How many cloud services (like Dropbox or Google Drive) do you need, where are your “cloud” files actually kept, and how can you keep your monthly cost down?

  • Email: How can you ensure that attachments make it through? Do you worry about where your email is actually located? Did you know you can choose an email address that will work over time and make you look better online?

  • Backups: Are you relying on a backup strategy that will let you down? Should you worry about what happens if you start up your Mac from a bootable duplicate?

  • Encryption: Do you understand why the U.S. government is going after the giant tech companies, and why the stakes are high for your own use of encryption?

  • Passwords: Do you know why it’s such a bad idea to use the same password for multiple sites, or to rely on a pattern? (Please, please, use a password manager.)

  • Web: Are your Web searches finding what you want quickly and easily? Did you know that you can navigate the Web more effectively if you understand how URLs work?

About the Author

Joe Kissell
Joe Kissell

Joe Kissell has written numerous books about technology, including many popular Take Control ebooks, with an emphasis on Apple products. He's also Senior Editor of TidBITS and a Senior Contributor to Macworld, and previously spent ten years in the Mac software industry.

Table of Contents

  • Read Me First
    • Updates and More
  • Introduction
  • 1. Misplaced Trust (and Mistrust)
    • The Object of Your Trust
    • The Domain of Trust
    • Mediated Trust
    • How Outside Influences Disrupt Trust
    • The Bottom Line on Trust
    • Trusting Technology
  • 2. Do Privacy Policies Mean Anything?
    • Policies vs. Facts
    • What’s in the Fine Print
    • Put Privacy in Context
  • 3. Cloudy Choices for Cloud Storage
    • Factors to Consider
    • The Path of Simplicity
    • Alternative Approaches
    • Figuring Out Where Your Data Is
  • 4. IMAP Misconceptions
    • (Not So) New Kid on the Block
    • Where the Messages Are
    • File It Once, Find It Everywhere
    • More Different than Alike
    • Standards vs. Practices
    • POP on over to IMAP
    • Stuck in the Past
  • 5. Mac Apps: An Open and Closed Case
    • How Not to Open an App
    • The Fast Find-and-Open Move
    • Finding Apps Manually
    • Other Ways to Open an App
    • Quitting an App
  • 6. The Right Way to Search the Web
    • One Wrong Way to Search the Web
    • Search Facts Everyone Should Know
    • Web Search Tips and Strategies
  • 7. Overcoming URL Confusion
    • What’s in a URL
    • What’s Not in a URL
    • URLs in Action
  • 8. Java, JavaScript, and You
    • Java, East of Krakatoa
    • Once upon a Platform
    • Joe on Java
    • JavaScript
    • Final Thoughts
  • 9. Four Password Myths
    • 1: One Password Can Rule Them All
    • 2: Nine Is Enough
    • 3: Hackers Can’t Guess My Pattern
    • 4: Attackers Will Use the Front Door
    • Don’t Worry, Be Happy
  • 10. Twelve Stupid Backup Strategies to Avoid
    • 1. Having No Backups at All
    • 2. Depending on Data Recovery Apps or Services
    • 3. Wishful Thinking
    • 4. Doing Manual Backups
    • 5. Using Only Time Machine
    • 6. Using Only Clones for Backup
    • 7. Having No Offsite Backups
    • 8. Having Only Online Backups
    • 9. Relying Solely on Dropbox (or a Similar Service)
    • 10. Assuming Web Apps Don’t Need Backups
    • 11. Thinking of RAID as a Backup
    • 12. Not Testing Your Backups
    • Be Smart about Your Backups
  • 11. Booting Your Mac from a Duplicate
    • Swapping Your Startup Drive
    • Booting from an External Drive
    • Booting a Different Mac
    • Don’t Sweat It
  • 12. Encryption Misunderstandings
    • Encryption Basics
    • Encrypting Files and Folders
    • FileVault and other Full-disk Encryption Tools
  • 13. 1Password vs. iCloud Keychain
    • 1Password’s Advantages
    • iCloud Keychain’s Benefits
  • 14. How Email Attachments Work (and Don’t)
    • A Few Words about MIME
    • The Role of the Email Client
    • Attachment Tips for Everyone
    • Attachment Tips for Apple Mail Users
  • 15. Email Address Misconceptions
    • What’s Your Email Address?
    • A Couple’s Address? Really?
    • Accounts, Domains, and Providers
    • Ditch a Locked-In Provider
  • 16. Keeping Your Bits from Being Flipped
    • Think Like a Two-Year-Old (at First)
    • Think Like a Grownup
    • Ask the Right Questions
  • Other Books about Being Wrong
  • About This Book
    • Ebook Extras
    • About the Author
    • About the Publisher
  • Copyright & Fine Print

About the Publisher

This book is published on Leanpub by Take Control Books

With its Take Control series of ebooks, alt concepts inc. covers a wide range of technology topics, with a special emphasis on Apple products and services. Our catalog comprises over 100 titles, and we’ve sold hundreds of thousands of ebooks in the process of providing expert advice and technical know-how to tens of thousands of readers around the world. Join us today!

The Leanpub 45-day 100% Happiness Guarantee

Within 45 days of purchase you can get a 100% refund on any Leanpub purchase, in two clicks.

See full terms...

Write and Publish on Leanpub

Authors, publishers and universities use Leanpub to publish amazing in-progress and completed books and courses, just like this one. You can use Leanpub to write, publish and sell your book or course as well! Leanpub is a powerful platform for serious authors, combining a simple, elegant writing and publishing workflow with a store focused on selling in-progress ebooks. Leanpub is a magical typewriter for authors: just write in plain text, and to publish your ebook, just click a button. It really is that easy.

Learn more about writing on Leanpub