You are on page 1of 9

1

The

GABer

The Newsletter of the Greater Albany Apple Byters


Volume 33, Number 5 - January 2017

iPhone is 10 Years Old

January 2017 GAAB Meeting

by Neil Hughes, appleinsider.com

January 9th marked exactly 10


years to the day since the first
iPhone was unveiled at the
Macworld 2007 expo by Steve
Jobs. Apple acknowledged the
milestone a day early, on Sunday,
with Tim Cook promising: The best is yet to come.

The next GAAB meeting will be Wednesday, January 11,


2017.

Meeting: Wednesday, January 11, 2017


7:00 PM - Panera Bread
161 Washington Ave Ext, Albany, NY

iPhone is an essential part of our customers lives,


and today more than ever it is redefining the way we
communicate, entertain, work and live, Cook, Apples
CEO, said in a press release. iPhone set the standard for
mobile computing in its first decade and we are just getting
started. The best is yet to come.
It was on Tuesday, January 9, 2007 that Jobs touted
the iPhone as three game changing products in one: a
revolutionary mobile phone, a widescreen iPod, and a
breakthrough internet communications device.
This year, Apple is expected to create a 10th anniversary
iPhone which has come to be known colloquially as
the iPhone 8 with a complete redesign that could
change the game once again. Its believed that the device
will have an edge-to-edge OLED display that could hide
components, like Touch ID, the home button, earpiece
and FaceTime camera within or behind the display,
presenting users with a true edge-to-edge screen.

Next GAAB Meeting

A map can be found at the GAAB website at


http://applebyters.com/index.php/meeting-information/
meeting_map/
GAAB Meeting Agenda:
Greetings and Dinner
Topics to be presented by members
News from Apple, including MacOS and iOS updates
The GAAB Help Desk: Bring your questions to the
meeting

Featured in this Issue

iPhone Turns 10 Years Old........................................................ 1

January 11, 2017


7:00 p.m.

Apple Ambassador..................................................................... 2

Panera Bread
161 Washington Ave. Ext.
Albany, NY

Education SIG............................................................................ 4

Internet SIG................................................................................ 3
GAAB Internet Addresses.......................................................... 8
The

January 2017
Serving the Apple ComputerGABer
User Community Since May 1984

Apple
Ambassador

The Greater Albany Apple Byters is an Apple Computer User Group.


Membership privileges include this newsletter, access
to a large public domain software and video/audio
tape library, local vendor discounts, special interest
groups, and other special offers.

by John Buckley

Contents of The GABer are copywriten, all rights


reserved. Original articles may be reprinted by notfor-profit organizations, provided that proper credit
is given to the author, The GABer, and a copy of the
publication sent to The GABer editor.

What is a VPN

The views expressed herein are the sole responsibility


of each author, and do not necessarily represent the
views of the Greater Albany Apple Byters.
Note: Trademarks used in this newsletter are recognized as trademarks of the representative companies.

Over this past year with all the talk about hacking
computers, there has been much talk about how to protect
your data. One way is to use a Virtual Private Network.
There are other ways of protecting your devices including
those built into your Apple Devices which we will discuss
at our meeting.

Officers & Special Interest Group Leaders


Program Coordinator
John Buckley
272-7128

Why You Should Start Using a VPN


(and How to Choose the Best One for
Your Needs)

Membership Director
John Buckley
272-7128
Treasurer
Tim Cook
408-996-1010

by Alan Henry, lifehacker.com

You may know what a VPN, or Virtual Private Network,


is; you probably dont use one. You really should be using
a VPN, and even if you dont think so now, at some point
in the future you may consider it as important as your
internet connection.

Public Domain Librarian


Bill Shuff
393-9753
Newsletter Editor
Roger Mazula
466-7492

When we took at look at your five favorite VPN service


providers, we noticed a few things. First, being the best
is big business for VPN providers, and theyll fight dirty to
be one of them. Second, there are so many VPN providers
that its difficult to choose a really good one. VPNs are not
all created equally, and in this post, were going to look
at what a VPN is, why you want one, and how to pick the
best one for you. Lets get started.

Education SIG
John Buckley
272-7128
Internet SIG
Lou Wozniak
465-2873

Continued on page 6.
The

GABer

January 2017

Internet SIG
Hack-Proof Your Life:
5 Key Steps to Boost Your
Safety Online
by Kim Komando, Komoando.com

At this moment, someone wants your


information. Hackers covet your email
account, your home address, and your
social security number. They want to
commandeer your webcam and break
into your bank account. They are just
waiting for you to slip up and give them
a chance.
Everywhere you look, malevolent coders are finding
backdoors and vulnerabilities. There are simple ways to
protect yourself. But where do you start?
Follow these five steps to boost your safety online instantly.
1. Passwords
Ive heard it a million times: I know that I shouldnt use
the same password at every site, but I do or Every time
I set a new password, I forget it.
Well, get over it. Relying on a weak password is asking
to be hacked. Your passwords are either your first line
of defense against hackers, or theyre an open window
that lets them slip through. In cyber-security, there is no
middle ground.
How dangerous is it? A lowercase, six-character password
takes a hacker around 10 minutes to figure out. Add four
more characters, and you extend the time of that heist by
45,000 years.
Ready to give your passwords the strength of Fort Knox?
Heres a quick to-do:
Create a unique and complex password that isnt hard
to remember. One trick is a passphrase, which is both
a statement and a complex series of characters, cases,
and numbers. Make a phrase thats specific to you like,
MySonWasBornOnAug12!

I wrote an entire tip about tools and tricks to remember


hard-to-guess passwords. Click here for the best solutions
to remember difficult passwords.
2. Set Up Two-Factor Identification
Youve probably seen this before, even if you didnt know
what it was called. Two-factor identification is a fancy
name for adding another step to the login process. A login
page may ask for your first car or your favorite food. The
website might even send a text message with a special code
to make sure you are who you claim to be.
Two-factor identification adds an important layer of
protection to your account. For hackers, the coup de grace
is setting up instant alerts when your account is accessed
from an unfamiliar device or location. Usually, this is
because youre logging into your email account from an
internet caf in London, or youre checking your bank
balance on a trusted friends phone.
Other times, its a hacker who is trying to figure out your
credentials. You will receive a notification by email or
text saying that there was a login from an unrecognized
machine or someone asked to reset your password. The
login will not be authorized or the password reset without
having the special code included in the email or text.
If you do nothing else on this list, click here for the steps
to turn on two-factor authentication on Google, Facebook
and other sites you use.

GABer

The

January 2017

Change your password regularly, but not too often. I


recommend that you change your password at least once
every 12-month period. If one of the services you use
is involved in a data breach, youll want to update your
password for that account.

Continued on page 8.

Education SIG
Whats on the Horizon for K-12 Ed Tech in 2017
by Roger Riddell, educationdive.com
4 School and District Tech Chief Weigh in with their Predictions and Concerns
To say the least, 2017 promises to be an interesting year for
K-12 education. The incoming administration of Presidentelect Donald Trump and impending implementation of
the Every Student Succeeds Act alone promise to keep
educators hands full, to say nothing of ongoing tech
challenges.
As educators and students gear up to finish out the latter
half of the 2016- 17 school year, we reached out to four
district tech chiefs and thought leaders for their thoughts
on ed tech predictions, concerns and trends facing
administrators in the new year.
Next year, I think
CIOs, CTOs and
tech directors
will continue the
trend to focus
less on devices,
programs and
apps and more
on instruction.
Its been great to
have conversations about student learning and goals over
whether we should purchase this device or that. I also
hope to see the conversation around decentralizing the
MakerSpace open up. Whereas weve been spending the
past few years liberating computers from a lab setting
and putting them in classrooms in the hands of students, I
hope to see the same happen with maker ed. Our district
is focusing on this essential question now: How can
makerspaced pedagogy support and enhance learning in
all content areas at all grades?
More school districts will begin to invest in cyber security
from employee training to technologies geared to abate
cyber attacks. The focus upon digital equity and the
homework gap at districts, states, and the national level
over the past few years begins to grow. This growth will
drive districts and states to begin investing at a higher rate
in innovative technologies or programs to provide students
network connectivity outside of school. Makerspaces will

become the norm in schools across the country, with the


library or computer lab being converted to innovative
learning labs with 3-D printers, robots, drones, circuits,
LEDs, metal, tools and a variety of traditional supplies
like paper, cardboard boxes and paints. The makerspaces
will spark further interest in robotics programs and become
a normal place in schools as opposed to a five- year fad.
Robotics programs will continue to expand rapidly in
schools, and given the popularity, robotics competitions
begin to rival football, basketball, soccer and baseball
events at high schools around the country while prompting
the recognition as an NCAA sport. OK, thats maybe a
little far fetched,
but the robotics
competitions
are ready for
impressive
growth in the next
three years.
Among concerns,
any possible
impact to E-Rate
from the new Presidential Administration. Increasing
cyber attacks are attempting to gain student personal
identifiable information, financial resources or disrupting
district technology. Ransomwear is becoming even
more potent and insidious. As the nation faces a teacher
shortage, districts confront a unique challenge to ensure
large numbers of new teachers are successful in the first
years in their classrooms, but also get quality training to
integrate technology at a high SAMR level into instruction.
With schools driving forward on technology enriched
learning, its imperative to ensure new teachers utilize the
technology to avoid creating a digital equity gap within
their school.
Redesigned learning spaces continue to be an important
trend within schools for the next five years, driven
by the continued technology adoption in schools. As
research illustrates the positive impact from utilizing new
furniture, lighting and classroom layout, districts will

The

GABer

January 2017

5
align to support student-centric teaching and learning. The
pedagogical shift to collaborative learning environments
will support the continued purchasing of technology and
furniture to support a new classroom model. As cost and
limited curriculum hinder widespread adoption of these
technologies, the further investment in virtual reality (VR)
and augmented reality (AR) curriculum development
aligned to standards sets the stage for these technologies
becoming widespread in classrooms within a few years.
Districts continue to struggle with big data, but the industry
will begin to develop e ective programs to provide schools
with actionable data in a near real-time for teachers and
administrators to assist students.
I think [this last point] falls into all there categories,
perhaps. The nation is suddenly very cognizant regarding
fake news articles. The impact these articles played in
the presidential election and likely are going to play in
everything from politics to information knowledge is going
to be tremendous this year and going forward. There is
going to be a vocal call at all levels for educators to add
further critical thinking assignments and text analysis to
the work already going on in class. To help meet the need,
schools are going to increasingly rely upon Common Sense
Media for resources to build lessons around text analysis
(both online and printed). I also anticipate publishers
and other vendors jumping into the fray with curriculum
offerings to deploy.
I can speak to trends and changes here at Garnet Valley.
We have begun developing our own Cyber Program to
complement other education offerings here. We call the
Cyber Program eSchool@GarnetValley. We are moving
to incorporate blended classes where students meet faceto- face with teachers a few days per week and online the
other days. We are dipping our toes into virtual reality with
Google Expeditions and NearPod VR. We have redesigned
our large learning spaces (libraries and labs) into more
modern, student-centered spaces. We have changed our
professional development model to o er more choice.
We adopted a new SIS, Alma, which has allowed our
students to choose their own learning path each day and
has simplified our SIS and software integrations. GV has
also signed on with the U.S. Department of Education for
their #GoOpen Movement with OER.
As for predictions, virtual reality will hit the classroom in
a big way as prices come down. Also, we have begun to
replace all our of older SMART Boards with flat screen TVs
as their prices have dropped. And as more software become
web-based, hopefully no more software/app downloads,
which will allow schools to be device agnostic.

A second theme for this coming year will (hopefully) be


the increased attention on digital equity concerns, not
just regarding access but also regarding usage. Existing
research indicates pretty clearly that, even when they have
access to computers, traditionally-underserved students
typically use learning technologies in different ways than
their white, more a affluent peers. For instance, they get to
use technology less often to make and create, instead being
pushed more often into drill and kill software systems
designed to get them to some desired level of academic
proficiency. While proponents of remedial software put
forth the notion that students have to learn the basics
before they can complete more complex work, more
progressive school systems will show that students can gain
necessary, foundational knowledge and skills while doing
more meaningful activities that also are more engaging
and interesting to students. Maybe a few districts will be
brave enough to conduct internal technology usage audits
and then publicly and visibly share the results
Finally, we should see the burgeoning movement to
pay more attention to the technology needs of school
administrators not just students and teachers continue
to grow. Initiatives such as the Future Ready Leadership
Summits, the school technology leadership programs at the
University of Kentucky and Johns Hopkins University, the
new digital leadership chapter in this years Handbook
of Research on the Education of School Leaders, and
UCEAs Center for the Advanced Study of Technology
Leadership in Education (CASTLE) will drive attention
to this oft-neglected technology focal area. As Im fond of
saying, if we want to see changes in systems rather than
isolated internal pockets of innovation, we must work with
the people who are formally in charge of those systems.
Our investments in technology leadership are woefully
inadequate, but recent developments seem promising.

GABer

The

January 2017

Over the coming year, were going to continue to see a


battle over the meaning of personalization. Numerous
technology vendors, blended learning advocates, adaptive
learning software providers and policymakers will continue
to put forth the idea that personalized learning simply
means running students through individually-chunked
digital content at their own pace. The goal is for students
to master more recall and regurgitation-type items in the
hopes of better performance on standardized tests. The
growing project- and inquiry-based learning movement,
however, will rightfully argue that comparatively
theres not much personal about this process of
computing machines putting students through their paces.
This definitional fight over instructional meanings will play
out in countless permutations in schools across the country.

Apple Ambassador
Continued from page 2.

What Is a VPN?
Put simply, a Virtual Private Network,
or VPN, is a group of computers (or
discrete networks) networked together
over a public networknamely, the
internet. Businesses use VPNs to
connect remote datacenters, and individuals can use
VPNs to get access to network resources when theyre not
physically on the same LAN (local area network), or as a
method for securing and encrypting their communications
when theyre using an untrusted public network.
When you connect to a VPN, you usually launch a VPN
client on your computer (or click a link on a special
website), log in with your credentials, and your computer
exchanges trusted keys with a far away server. Once both
computers have verified each other as authentic, all of
your internet communication is encrypted and secured
from eavesdropping.
The most important thing you need to know about a
VPN: It secures your computers internet connection to
guarantee that all of the data youre sending and receiving
is encrypted and secured from prying eyes.
Whether the VPNs youre familiar with are the ones
offered by your school or business to help you work or
stay connected when youre traveling or the ones you pay
to get you watch your favorite shows in another country as
they air, theyre all doing the same thing. For much more
detail on what VPNs are, how they work, and how theyre
used, check out this How Stuff Works article.
Why You Need a VPN, or How You Can Benefit from
Using One
A VPN alone is just a way to bolster
your security and access resources
on a network youre not physically
connected to. What you choose to
do with a VPN is a different story.
Usually, VPN users fall into a few
separate categories:
The student/worker. This person
has responsibilities to attend to, and
uses a VPN provided by their school

or company to access resources on their network when


theyre at home or traveling. In most cases, this person
already has a free VPN service provided to them, so theyre
not exactly shopping around. Also, if theyre worried
about security, they can always fire up their VPN when
using airport or cafe WI-Fi to ensure no ones snooping
on their connection.
The downloader. Whether theyre downloading legally
or illegally, this person doesnt want on some companys
witch-hunt list just because they have a torrenting app
installed on their computer. VPNs are the only way to stay
safe when using something like BitTorrenteverything
else is just a false sense of security. Better safe than trying
to defend yourself in court or paying a massive fine for
something you may or may not have even done, right?
The privacy minded and security advocate. Whether
theyre a in a strictly monitored environment or a
completely free and open one, this person uses VPN
services to keep their communications secure and
encrypted and away from prying eyes whether theyre at
home or abroad. To them, unsecured connections mean
someones reading what you say.
The Globetrotter. This person wants to watch the
Olympics live as they happen,
without dealing with their crummy
local networks. They want to check
out their favorite TV shows as they air
instead of waiting for translations or
re-broadcasts (or watch the versions
aired in other countries,) listen to
location-restricted streaming internet radio, or want to
use a new web service or application that looks great but
for some reason is limited to a specific country or region.
Some combination of the above. Odds are, even if youre
not one of these people more often than not, youre some
mix of them depending on what youre doing. In all of
these cases, a VPN service can be helpful, whether its
just a matter of protecting yourself when youre out and
about, whether you handle sensitive data for your job and
dont want to get fired, or youre just covering your own
ass from the MPAA.
Even if none of the above really sound right to you, you
can still benefit from using a VPN. You should definitely
use one when you travel or work on an untrusted network
(read: a network you dont own, manage, or trust who
manages.) That means opening your laptop at the coffee
shop and logging in to Facebook or using your phones
Wi-Fi to check your email at the airport can all potentially
put you at risk.

The

GABer

January 2017

7
Weve shown you how to build your own VPN for remote
gaming and browsing that also protects your security,
shown you how to make a VPN even more secure, and
shown you dozens of services that operate free and paid
VPNs you can sign up for and use. Weve even put the
question to you several times to tell us which VPN service
providers you think are the best. So how do you pick a
solid VPN service?
What Makes for a Good VPN?
The best VPNs offer a solid balance of features, server
location, connectivity protocols, and price. Some are
great for occasional use, others are geared towards getting
around the location restrictions companies put on their
apps and services, and others are targeted at people who
do heavy downloading and want a little privacy while they
do it. Heres what you should look for.
Protocol: When youre researching a VPN, youll see terms
like SSL/TLS (sometimes referred to as
OpenVPN support,) PPTP, IPSec, L2TP,
and other VPN types. We asked Samara
Lynn, Lead Analyst for Networking and
Small Business at PCMag, whether or
not a user shopping for a VPN should
shop for one over another. SSL is what is commonly used
these days. All of these protocols will provide a secure
connection, she explained, and pointed out that most
solutions are invisible to the end-user anyway. Strictly,
each protocol has its benefits and drawbacks, and if youre
concerned about this (specifically, PPTP vulnerabilities,)
youre probably already aware of them. Most users dont
need to be concerned about thiscorporate users on the
other hand, are probably all using IPSec or SSL clients
anyway.
Corporate and Exit Locations: Depending on what
youre using a VPN for, your services locationand the
exit locations you can chooseare important to consider.
If you want to get around a location restriction and watch
live TV in the UK, for example, you want to make sure
your VPN service provider has servers in the UK. If youre
concerned about privacy or state-sponsored snooping, you
may want to pick a service operated outside of your home
country. Similarly, if the service is based on the US, theyre
subject to US laws, and may be forced to turn over usage
data to the authorities upon request. Many people make
more of this than they should (weve seen overseas services
turn over their data to friendly governments without any
hesitation repeatedly), but its important to make sure a
VPN has servers in multiple locationsor at least the
location youre interested inwhen shopping.

Anti-Malware/Anti-Spyware Features: Using a VPN


doesnt mean youre invulnerable. You should still make
sure youre using HTTPS whenever possible, and you
should still be careful about what you download. Some
VPN service providersespecially mobile onesbundle
their clients with anti-malware scanners to make sure
youre not downloading viruses or trojans. When youre
shopping, see if the providers youre interested in offer
anti-malware protection while youre connected. For
example, previously mentioned Hotspot Shield offers
malware protection to its premium users. It may not be a
dealbreaker for you, but its always good to have someone
watching your back.
Mobile Apps: If youre going to spend money on a VPN
service provider (or even if you use a free one, frankly), you
should be able to get a consistent experience across all of
your devices. Most prominent providers offer desktop and
mobile solutions for individual users, and while corporate
and school networks may be a bit behind the curve here,
theyre catching up too. Make sure you dont have to
use two different VPNs with two different policies and
agreements just because you want to secure your phone
along with your laptop.
Price: Finally, go into your user agreement with both eyes
open. You should read the privacy policy for the service
youre interested in, and be very aware of the differences
between free and paid services. For example:

Free VPN Providers are more likely to log your


activities and serve contextual ads while youre
connected. Theyre also more likely to use your usage
habits to tailor future ads to you, have fewer exit
locations, and weak commitments to privacy. They
may offer great features, but if logging and privacy

GABer

The

January 2017

Logging: When you connect to a VPN, youre trusting the


VPN service provider with your data. Your communications
may be secure from eavesdropping, but other systems on
the same VPNespecially the operatorcan log your
data if they choose. If this bothers you (e.g., youre the
privacy/security advocate or the downloader), make
absolutely sure you know your providers logging policies
before signing up. This applies to location as wellif
your company doesnt keep logs, it may not matter as
much where its located. (Theres a popular rumor that
US-based VPN providers are required to log, in case the
government wants them. This isnt true, but the government
can always request whatever data they have if they do
log.) For a good list of VPN providers that dont log your
activities when connected (and many that do), check out
this TorrentFreak article.

are important to you, you may want to avoid them.


However, if you just need quick, painless security
while traveling on a budget, theyre a great option.

The rule of thumb is this: Old accounts contain more


personal data than you realize, no matter how short-lived
and no matter how long its been abandoned.

Subscription VPN Providers usually take your privacy


a bit more seriously, since youre paying for the
service. Its unusual for them to show ads, although
whether they do logging or store data about your usage
varies from company to company. They usually offer
free trials so you can give the service a shot first, but
remember: just because youre paying for a service
doesnt mean you shouldnt do your homework.

Have too many online accounts to remember them all?


Click here for a site that provides you with the steps you
need to close down the accounts youre no longer using.

A mix of features and price make a good VPN, but


plenty of bad VPNs masquerade as good ones. Look for
articles written by trustworthy sources that discuss the
merits of each service based on its features, versus simple
rundowns and user testimonials, which are almost always
polluted by a combination of fanatical users and corporate
bootstrapping in attempt to get their names out to potential
customers.
Which VPNs Are The Best?
When we ran our recent Hive Five on VPN service
providers, we heard from VPN providers begging to be
included, angry CEOs who claimed their company was
maliciously left out, and others accusing some of the
contenders of illegal or unethical behavior. We took at look
at the poll and the claims, and while theres no definitive
proof the poll was gamed, we decided to come up with
our own top five, based on our own research rather than
reader feedback, that are great whether youre the privacy
advocate, the student, or the downloader.
These lists change year by year and who is writing about
the services and what they consider important. You can
search the web and make a choice.

Internet SIG
Continued from page 3.

3. Delete Accounts Youve Abandoned


Youve probably encountered this before. Some spammy
message shows up in your inbox, allegedly sent from
your beloved Aunt Joan. Why does Aunt Joan want you
to click on this strange-looking link? Why is she suddenly
interested in giving you a limited-time discount on a Rolex
watch? These messages are sure signs of a hacked account.

Sometimes, you may want to delete accounts simply


because youve lost trust in the company thats storing your
private information. After Yahoos cover up of multiple
data breaches, I recommend that you close your Yahoo
account for Yahoo Mail and other related services such as
Flickr, Tumblr, Yahoo Sports, Yahoo Messenger, Yahoo
Shopping, Yahoo Music, etc. Click here for a step-by-step
guide for the steps you need to take right now if youre a
Yahoo customer.
4. Check if Your Info Has Been Stolen
Now youre on a mission to boost your security. But what
about data thats already been stolen? How do you find out
whether an account has already been broken into?
At least one trusted site is dedicated to precisely that:
HaveIBeenPwned sifts through your accounts in search
of security breaches. Just run your email address and
username through the search field and it will tell you if your
login information has been linked to any past breaches.
5. Encrypt All of Your Messages
Encryption used to be a word reserved for international
super-spies but not anymore. What youre looking for is
end-to-end encryption. This method scrambles your
messages so that they cant be read if someone other than
the intended recipient gets it.
Signal Private Messenger One encrypts all messages endto-end by default. The service also doesnt keep any user
information, such as address books or messages, on its
servers. It lets you use your existing phone number and
contacts list. For a full list of Signal features and download
instructions, click here.
Remember, your chain of online security is only as strong
as its weakest hyperlink.
Want to know other ways can you stay safe in the era of
cyber-crime? You can listen to the Kim Komando Show
on your phone, tablet or computer. From buying advice to
digital life issues, click here for my free podcasts.

The

GABer

January 2017

GAAB Internet Addresses


Names

E-Mail Addresses

Aaron Ambrosino........ aambrosi@mac.com


Gary Blizzard.............. gmblizzard@aol.com
Mark Bogossian........... mark@castlecomp.com
Steve Bradley.............. ssbradley@adelphia.net
John Buckley............... jbuckley@nycap.rr.com
Sheldon Carnes............ sheldoncarnes@hotmail.com
Tina Cook.................... twonotrump@nycap.rr.com
Anthony Eldering........ tonye11@verizon.net
Trudy Ellis................... TE52@earthlink.net
Lilajane Frascarelli...... afrascar@nycap.rr.com
Les Goldstein............... lgoldst1@nycap.rr.com
Richard Hester............. hesterfp@capital.net
Ottmar Klaas................ ottmar.klaas@gmail.com
Michael LaFrank......... mglafrank@gmail.com
Thomas Levanduski.... msglevnduski@aol.com
Cecilia MacDonald...... cecilia@midtel.net
Mike Mannarino.......... rfd230@nycap.rr.com
Roger Mazula.............. aluzam@aol.com
Brendan OHara.......... bohara1@nycap.rr.com
Eric/Lee Rieker............ Erieker@aol.com
AbdurRahman Rozell.. aryr100@gmail.com
Judith Schwartz........... jfschwartz2@earthlink.net
Saul Seinberg............... saul.seinberg@gmail.com
Bill Shuff..................... wjshuff@earthlink.net
Shelly Weiner.............. olliedawg@yahoo.com
Lou Wozniak............... louw@nycap.rr.com

To start or renew your GAAB


membership, see Tim Cook or send
your fees payable to him at the
following address:
Timothy Cook
1 Infinite Loop
Cupertino, CA 95014

Visit GAAB on the Internet at http://www.applebyters.com

GABer

The

January 2017

You might also like