Opening All The Doors – Mac Geek Gab 904

A big part of keeping your computer running is troubleshooting the *right* things, and that’s not always easy to discern. It often requires opening all the wrong doors before you find the right one to pass through en route to your solution. Listen today as Dave and John share some troubleshooting tips about Dolby Atmos, AirPods, Notifications, Backing up iCloud Drive, the Terminal, and more. Of course, your two favorite geeks also share your (and their!) Quick Tips, Cool Stuff Found, and more. Press play and enjoy learning five new things together!

Roomba Delivers On Its Promise to End Pet Poo Disasters

We’ve seen the videos, those tragic tales of robot vacuum cleaners leaving a trail of puppy poop behind. For all of their AI technology, they simply don’t recognize one fact. Some messes just won’t vacuum up neatly. Your robotic cleaning device ends up doing more harm than good. Roomba maker iRobot says they’ve nipped the problem in the bud. A writer at Daily Paws put this to the test. In her testing, the latest Roomba j7+ really does have the digital smarts to avoid pet messes.

I came home late from work one night to see that my elderly Chihuahua had missed the wee pad by a good bit and left her own dollop of poop on my kitchen floor. I had scheduled the Roomba for a run that was set to begin in a few minutes, so instead of cleaning up the accident myself, I decided to see what the j7+ would do.

It expertly avoided my pup’s poop. I was absolutely in awe. Once again, after the clean, the iRobot app asked me if this was a temporary obstacle, and I confirmed.

New 'BotenaGo' Targets Routers and Smart Home Devices in Devastating Attack

AT&T Alien Labs discovered malware it dubs BotenaGo. It affects millions of routers and Internet of Things devices found with smart homes. The “devastating” part comes from the fact that it uses over 30 separate exploits due to insecure devices.

The BotenaGo malware starts by initializing global infection counters that will be printed to the screen, informing the hacker about total successful infections. It then looks for the ‘dlrs’ folder in which to load shell scripts files. A loaded script will be concatenated as ‘echo -ne %s >> ‘. If the ‘dlrs’ folder is missing, the malware will stop and exit at this point. For the last and most important preparation, the malware calls the function ‘scannerInitExploits’, which initiates the malware attack surface by mapping all offensive functions with its relevant string that represent the targeted system.