How can I make my wired headphones/earplugs wireless? I stumbled upon a magic trick.

If you’re the guy like me who prefers everything to be cable less, or if you just have a nice pair of speakers that does not support bluetooth, there’s actually a cool trick you can do.

For a few dollars you can buy a device called Trond. Trond is a small battery powered bluetooth device thats able to send and receive audio via Bluetooth.

So for instance, my old jack-wired headset now works on my iPhone X that doesn’t even have an jack input. Instead I have cabled my Tron to my headset, and then configured Tron to send the audio to my iPhone X.

Let’s say you have a nice old speaker system at home that currently only has a jack cable, you could also simply connect your Tron to your speaker system and have it Bluetooth ready in no time.

Only disadvantage I have found so far is that the sound quality is not that good. In a small test I made, the reach is a little better than the built into Bluetooth device in Bose SoundLink III, but sound quality is really not that good. I am however in contact with Trond customer service who will either refund me or give me a device that doesn’t have sound quality issues.

What other cool ideas could you come up with using Trond or a similar Bluetooth sender/receiver? Let me know in the comments section.

How do I make a screen-recording?

Anyone can record the screen easily.

If you prefer not to download any additional software to record your screen, chances are you already have a program that can do it for you. Luckily, if you’re on Mac, you can simply open QuickTime Player. On Windows you’ll need PowerPoint, or other download alternative (free) software – but don’t worry, this is easy.

On Mac OS

Step 1: Open QuickTime Player (installed on every mac), and from the top menu bar, click New Screen Recording ⌃⌘N.

Step 2: Ensure you use the Internal Microphone (then your voice may be heard). Optionally, you may also tick “Show Mouse Clicks in Recording”.

Step 3: You’re ready to record your screen. Click the big red recording button.
You’ll be able to choose whether you wish to record you whole screen, or only the part of the screen.

Step 4: End the recording by clicking the stop button in the menu bar.

On Windows

The latest versions of PowerPoint include the feature to make a Screen Recording.

How to record your screen using PowerPoint on Windows

Step 1: Go to the “Insert” tab, and select “Screen Recording.”

Step 2: Choose “Select Area” to choose the specific area of your screen you want to record. If you want to record the entire screen, press Windows Key +Shift + F

Step 3: Click the “record” button,” or pressWindows Key +Shift + R

When you’re done you can save the video as a separate file to access or embed as you see fit.

Don’t have PowerPoint? Check out these alternative apps

If you don’t have PowerPoint check out OBS Studio (free) or Snagit (paid)

Bitcoin and cryptocurrencies is for criminals

Many people I meet say: “bitcoin is for criminals” — maybe because they’ve heard that it has been used to buy drugs on deep-web services such as Silkroad. Just like criminals use Danish Kroner or U.S. Dollars to trade illegal things with.

Heres’ some wise reasons why I believe the title of this post couldn’t be further away from the truth.

  • Of all the currencies that criminals have preferences for the U.S. Dollar is king.
  • It is way more difficult to do money-laundering with Bitcoin compared to e.g. U.S. Dollar
  • Bitcoin is a tool to safe humanity from tyrans and oligarchy (the real criminals), today just covered up as a “get rich scheme”
  • Mafia clans in random countries such as Russia, Venezuela, Zimbabwe and so on uses U.S. Dollars
  • Bitcoin, per the specifications today, is probably the only monetary system that is most anti-criminal, given how open it is.
  • “Yeah but cryptocurrencies are anonymous and that enables criminal behaviour”, she said, handing a €50 bill over the counter at Starbucks that only hours before was used to buy meth cut with knock-off ritalin from a dirty cop outside an underage nightclub”

Data, data, data…

Given we have data on everything when using Bitcoin, in the case that we need to investigate a serious crime, we have very good data analysts and tools, to solve the issue, of even the most complex money laundering going on.

A crime done with cash would be untraceable. One in bitcoin would not.

For further reading, have a look at Why Criminals Can’t Hide Behind Bitcoin

Serious macOS High Sierra security vulnerability – root user with no password

A serious vulnerability has been found in macOS High Sierra – something I have no clue how could have ever happened. The main problem with this issue is, that it really doesn’t require any computer knowledge at all to take advantage of.  Your grandparents can do it, given they are able to move the mouse and use the keyboard (most non-techie users I know these days have finally learned this).

For some odd reason, the user “root”  has no password!!!

This means: anyone with access to your computer can login as administrator using no password. The username is root and the password is blank. Blank is in total blank. Not “blank”. Yes. That’s right. BLANK.

What can a root user do?

  • Access your other user accounts
  • Disable Local Disk Encryption (FileVault)
  • Disable firewalls
  • Basically, he is GOD on your computer, and can do whatever he wants.

What you need to do

Apple is working on a fix, but there’s no time to wait. Please go ahead and change the root password to a strong password. See Apples Guide how to.

Some people advise to disable the root account, but this is misunderstood. If you disable the root account, you can reenable it again using a failed login attempt. Whatever you enter as password in the failed attempt, will now be the new password for the root user.

If you’re familiar with the terminal, you can simply run this command:

cat /dev/urandom | env LC_CTYPE=C tr -dc a-zA-Z0-9 | head -c 60 | xargs -I rootpw sudo dscl . -passwd /Users/root rootpw

This is serious.

It is even possible to remotely access your MacBook if you  have this feature enabled, so go do something about it.