Join is an app for Android that provides several functions. When used with the desktop app (Windows) or any desktop that supports the Chrome web browser, you can receive all of your phone’s notifications, share the clipboard, share files, and view/reply to SMS text messages. The last item is probably the feature that is most used. Below is what the initial SMS notification pop up looks like in Chrome.
For the techies reading, Join also has a full API, Tasker, and IFTTT support. So the things you can do with it are only limited by your imagination.
Join has 30 day trial and after that a one time $4.99 payment.
As a recent Synology convert, I continue to find interesting and well thought out features. Following up on last week’s Synology & Let’s Encrypt, Certs Made Easy one feature that I really like is the Application Portal which can be found in the Control Panel.
Inside that, click the Reverse Proxy tab and this is where the fun begins.
The idea behind this is that you will use Synology’s secure https connection to reverse proxy to an insecure http connection somewhere on your LAN, thus making that connection secure – especially if you’re connecting from outside your network.
Click Create and you’ll see something like this:
- Give the rule a Description.
- Source is HTTPS, usually * for any hostname. If you have many hostnames assigned to your Synology, you could restrict it to one. Port should be one that isn’t in use.
- Destination is where your unsecured host is. If your service is running on your Synology, it can simply be localhost, or if it is on another device elsewhere on your network, put in the URL you use to access it.
- If you destination host uses a port other than 80, use that for Port.
Below is an example of how I route a couple of services on my own LAN.
This is a great was to use a managed certificate on the Synology to secure other sites, even on other devices, with https.
Adding certificates to any service can be tricky and sometimes really frustrating. When I first started exploring my Synology I was delighted to see it has built-in support for Let’s Encrypt certs. For those that don’t already know, Let’s Encrypt (aka Certbot) provides free and industry-wide supported certificates.
Adding a cert to Synology is very simple and it supports multiple certificates with auto-renewal.
- To begin, just login to your Synology, enter the Control Panel and click on Security.
- Next, click the Certificate tab and click Add.
- From here, you want to Add a new certificate and click Next.
- Next, Get a certificate from Let’s Encrypt and click Next.
- Next fill out your Domain info, it would look something like this:
- Subject Alternate Name just means if you have subdomains, you would add them here. Like www.mydomain.org for a website, or any other. You can, in theory, add a completely different domain in this list and have it work, such as mycoolsite.com, but think it is better to do one Let’s Encrypt cert per domain to keep things organized.
For reference, here’s how my sites look with their respective domain certs.
Best of all, your certs will renew automatically with the Synology and Let’s Encrypt. Once set, you really only need to periodically check to make sure this is happening.
Do you like 80s Toys, Animation and Comics? If so, the Michael Mercy channel is for you! It’s a younger channel, at only 2 years old, but his content is an amazing amount of fun.
While he does do some really good reviews on movies and TV, my favorites are the toys of the 80s. Some I had, some I really wished I had (like the USS Flagg from GI Joe!) His toy reviews are always filled with great details, but even better is that he plays with the toys in an endearing way while showing them off and places clips of the shows along with them.
…and remember, Nerdmaste!
Recently I was having an issue with Node.js not being detected in my PATH with a Python script executed by launchd. This was bizarre to me for a couple of reasons.
First, I’ve been using launchd for awhile now, and any LaunchAgents run under my profile usually has detected anything in my path, including Homebrew installed binaries.
Second, when testing the script via Terminal it worked perfectly.
After reading the available launchd keys, I discovered you can add an EnvironmentVariable with a list of your PATHs that will be executed before the ProgramArguments key.
It worked perfectly, and since it seems to be little used, I thought I’d post it here. Here is an example of the format you want to use in your launchd item:
This is a quick trinket to fix an issue with App Translocation and Gatekeeper.
Starting with 10.12 an App from outside the App Store when run from a disk image or the downloads folder, path translocation kicks in to protect the system and runs the app in a contained read-only environment. At least from what I can understand from the documentation.
What is supposed to happen is when a user copies that app into the Applications folder (or really most anywhere else that is valid) and run again, Gatekeeper pops-up and asks if you’re really sure you want to run it because it’s from an unknown developer and that you need to visit System Preferences -> Security to Allow it.
Somewhere along the line, an attribute is set to turn off the quarantine for the read only mode and make the app behave normally. For whatever reason, this sometimes fails causing the app to not be able to save files or even it’s own preferences.
To fix this, you can use the xattr command via the Terminal to manually remove the quarantine attribute like so:
xattr -r -d com.apple.quarantine /path/to/your/application.app