AppleScruff1
Apr 20, 11:56 AM
Also the fact that its pretty obvious that Steve Jobs is obsessed with the Beatles.
That doesn't count either. You're looking at it wrong. :D
That doesn't count either. You're looking at it wrong. :D
tekmoe
Aug 28, 12:52 PM
I think my new rule will be to automatically place anyone using that line on my ignore list.
It lost its funny a long time ago.:rolleyes:
ditto.
It lost its funny a long time ago.:rolleyes:
ditto.
Derekasaurus
Jul 14, 09:19 AM
Bring 'em on, but place them in a mid-tower case.
Or a mini. ;-)
Or a mini. ;-)
linux2mac
Apr 28, 04:05 PM
"Awesome?"
*jumps into Windows 7 in Parallels to check it out again*
"Awesome???" :confused:
Don't worry, Windows 8 will be even better. Its going to have a built in PDF reader called "Modern Reader." Too bad Linux and OSX have had built in PDF readers for a decade now. Typical Microsoft, "if you can't beat them, copy them!"
ROFLMAO
*jumps into Windows 7 in Parallels to check it out again*
"Awesome???" :confused:
Don't worry, Windows 8 will be even better. Its going to have a built in PDF reader called "Modern Reader." Too bad Linux and OSX have had built in PDF readers for a decade now. Typical Microsoft, "if you can't beat them, copy them!"
ROFLMAO
DrDomVonDoom
Apr 11, 02:27 AM
I can only imagine Steve Jobs hunched over his desk like in 'Pirates of Silicon Valley" and screaming "YOUR STEALING FROM ME!!!!" lol.
Otherwise awesome news.
Otherwise awesome news.
MrCrowbar
Apr 19, 10:16 AM
Apple is starting to be less and less inovative. The iPhone UI hardly changes for the last 4 years. But hey, lets sue everybody.:rolleyes:
That's the whole point: do it right the first time and stay consistent. People don't want to learn new things all the time. There's so many 30+ year olds who are seriously afraid to upgrade from Windows XP to Windows 7 because it seems so different. I like buying the new version of something I already know as opposed to not knowing at all what I'm buying, spending precious hours of my life learning how to do the things I already could do on my old gadget.
When you buy a car you know how to drive it, set the mirrors and seats without reading the manual. If someone came out with a car without pedals and steering wheel, there will be a lot of people rejecting it before even trying it out. People don't want to learn to drive again. Innovation in user interfaces is when you take something that used to be complicated and make it simple. If it wasn't complicated from the beginning, there's no reason to change it unless you notice you did something wrong.
Lots of smartphones are total iPhone ripoffs with added features. They're seemingly slower, more complicated and crash more though. There's some things I absolutely hate about the iPhone, but it's an okay tradeoff.
That's the whole point: do it right the first time and stay consistent. People don't want to learn new things all the time. There's so many 30+ year olds who are seriously afraid to upgrade from Windows XP to Windows 7 because it seems so different. I like buying the new version of something I already know as opposed to not knowing at all what I'm buying, spending precious hours of my life learning how to do the things I already could do on my old gadget.
When you buy a car you know how to drive it, set the mirrors and seats without reading the manual. If someone came out with a car without pedals and steering wheel, there will be a lot of people rejecting it before even trying it out. People don't want to learn to drive again. Innovation in user interfaces is when you take something that used to be complicated and make it simple. If it wasn't complicated from the beginning, there's no reason to change it unless you notice you did something wrong.
Lots of smartphones are total iPhone ripoffs with added features. They're seemingly slower, more complicated and crash more though. There's some things I absolutely hate about the iPhone, but it's an okay tradeoff.
aiqw9182
Apr 25, 03:26 PM
You mean this one, a single card, running FarCry at 3840 X 2160 almost two years ago. Since this was almost two years ago, I'm sure its a little dated. :)
http://gizmodo.com/#!5277116/asus-mars-gtx-295-smoothly-running-far-cry-at-3840-x-2160-pixels
Single card? Do you even know what SLI is? Did you even read the article? :rolleyes:
I'm still waiting.
http://gizmodo.com/#!5277116/asus-mars-gtx-295-smoothly-running-far-cry-at-3840-x-2160-pixels
Single card? Do you even know what SLI is? Did you even read the article? :rolleyes:
I'm still waiting.
Tha Professor
Apr 22, 04:41 AM
I don't even know why am I so excited about this since I always have my iPod classic with me.
Even though it would be awesome if iPhone had an external-cloud based space of 160 GB to substitute my loaded gem. That could seriously break the need for 256 GB SSDs in iPhones for us audiovores...
Now only if all my music would be on iTunes Store too....
:apple:
Even though it would be awesome if iPhone had an external-cloud based space of 160 GB to substitute my loaded gem. That could seriously break the need for 256 GB SSDs in iPhones for us audiovores...
Now only if all my music would be on iTunes Store too....
:apple:
g7by08believeit
Oct 12, 05:10 PM
100% confirmed.
via Chicago Tribune:
http://img183.imageshack.us/img183/5016/25865863uz2.jpg
It looks like a more "true" red to me!
Look at the upper left portion of the picture! MBP black anodized with C2D
W00t!
via Chicago Tribune:
http://img183.imageshack.us/img183/5016/25865863uz2.jpg
It looks like a more "true" red to me!
Look at the upper left portion of the picture! MBP black anodized with C2D
W00t!
TVGenius
Aug 23, 05:21 PM
Somebody got PWNED!
pengu
Sep 17, 08:25 PM
WRONG GSM does NOT work in Japan. You can't go to any country and use it. Japan doesn't have GSM.
ok. see, if you actually READ my post, you would know that I said
I can take my phone to any country with a GSM network
ok. see, if you actually READ my post, you would know that I said
I can take my phone to any country with a GSM network
jacg
Sep 14, 02:14 AM
Wouldn't the scroll wheel be difficult to use right at the bottom of the device like that?
iMikeT
Aug 28, 12:34 PM
Quiet upgrade tomorrow?
MacinDoc
Sep 14, 03:38 PM
Any chance we'll see an Apple widescreen H.264/AAC camcorder there?
It's an interesting idea, but I think this one is in next year territory, when it can be combined with iTV for wireless video streaming to you Mac or your TV.
And how about an iPod dock connector/cable to use an iPod for storage to keep the costs down (and sell more iPods)?
A definite possibility, since one of the things Apple is purportedly demoing at the show is a data archiving system.
It's an interesting idea, but I think this one is in next year territory, when it can be combined with iTV for wireless video streaming to you Mac or your TV.
And how about an iPod dock connector/cable to use an iPod for storage to keep the costs down (and sell more iPods)?
A definite possibility, since one of the things Apple is purportedly demoing at the show is a data archiving system.
darklich
Apr 4, 12:19 PM
Can you people read the story and stop making it out to be a simple robbery?
http://www.10news.com/news/27421748/detail.html
http://www.10news.com/news/27421748/detail.html
jelloshotsrule
Oct 27, 09:03 AM
Seriously. I mean I support the environment, but I know reactionary sensationalism when I see it. As someone said, Greenpeace has lost most of it's respect, even with the EPA (Environmental Protection Agency).
i followed you up til you implied that the EPA is some gold standard of environmentalism. talk about an agency/group having lost respect...
i followed you up til you implied that the EPA is some gold standard of environmentalism. talk about an agency/group having lost respect...
munkery
Mar 23, 04:20 PM
http://www.macforensicslab.com/ProductsAndServices/index.php?main_page=document_general_info&products_id=174
Much of the information in the PDF (http://www.macforensicslab.com/Malware_on_Mac_OS_X.pdf) associated with this article (http://www.macforensicslab.com/ProductsAndServices/index.php?main_page=document_general_info&products_id=174) is incorrect. For example:
Page 26
It refers to the bundle architecture as insecure. The argument presented would be true if security sensitive apps were not owned by system. Given that they are owned by system, malware cannot modify the bundle of an app owned by system without authentication when the app is run with user privileges in an admin or standard account.
For example, show package contents of iTunes, Safari, or Mail and try to create a folder in the bundle. In relation to the example in the article, try renaming iTunes. The argument in the article relies on actions that can not be completed in an OS X admin account; these type of changes are even more restricted in a standard account.
Apps not owned by system are vulnerable but without privilege escalation can not install rootkits or keyloggers. Even apps owned by system run with user privileges and require privilege escalation to install dangerous payloads.
Mac OS X does not prompt for authentication if you install apps in the proper location for that user account type. When installed in the proper location, apps are sandboxed from the system level of Mac OS X by the Unix DAC model used within Mac OS X.
Windows is less secure because most apps (Chrome only exception I can recall) install their associated files in levels of the system that require authentication regardless of user account type (unless Admin in Windows XP because running as superuser - no authentication required to install with elevated privileges - very dangerous). It is easier to trick Windows users to install a trojan with elevated privileges given that almost all apps ask for authentication to install and the user can not distinguish the intent of that authentication.
Page 30
The claim that the Application folder is unprotected is false. Security sensitive apps within the Application folder are owned by system.
Also, security sensitive system binaries are still stored in /bin and /sbin in Mac OS X.
Page 31
The ability to read the contacts stored in Address Book could be used by a worm to propagate. But, malware that uses this to spread is not likely to appear in the wild if the malware is not profitable. It is unlikely that malware will be profitable without being able to hook (this is a specific function) into apps owned by system.
Page 33
Starts off talking about trojans, trojans are easily avoided with user knowledge in Mac OS X because most apps do not require authentication to install if installed in the appropriate location where the Unix DAC model protects the system.
Viruses using the model shown in the article will not be successful without privilege escalation. This is the reason why Mac OS X malware is not successful in the wild.
By default, very few server side services are exposed in Mac OS X and those that are exposed are sandboxed. Vectors for worm propagation are limited to client side. Client side worms require authentication to install and spread if do not include privilege escalation via exploitation because of the Unix DAC model used in Mac OS X. Trojans used to trick users to authenticate are less likely to be successful in Mac OS X as stated above.
Much of the information in the PDF (http://www.macforensicslab.com/Malware_on_Mac_OS_X.pdf) associated with this article (http://www.macforensicslab.com/ProductsAndServices/index.php?main_page=document_general_info&products_id=174) is incorrect. For example:
Page 26
It refers to the bundle architecture as insecure. The argument presented would be true if security sensitive apps were not owned by system. Given that they are owned by system, malware cannot modify the bundle of an app owned by system without authentication when the app is run with user privileges in an admin or standard account.
For example, show package contents of iTunes, Safari, or Mail and try to create a folder in the bundle. In relation to the example in the article, try renaming iTunes. The argument in the article relies on actions that can not be completed in an OS X admin account; these type of changes are even more restricted in a standard account.
Apps not owned by system are vulnerable but without privilege escalation can not install rootkits or keyloggers. Even apps owned by system run with user privileges and require privilege escalation to install dangerous payloads.
Mac OS X does not prompt for authentication if you install apps in the proper location for that user account type. When installed in the proper location, apps are sandboxed from the system level of Mac OS X by the Unix DAC model used within Mac OS X.
Windows is less secure because most apps (Chrome only exception I can recall) install their associated files in levels of the system that require authentication regardless of user account type (unless Admin in Windows XP because running as superuser - no authentication required to install with elevated privileges - very dangerous). It is easier to trick Windows users to install a trojan with elevated privileges given that almost all apps ask for authentication to install and the user can not distinguish the intent of that authentication.
Page 30
The claim that the Application folder is unprotected is false. Security sensitive apps within the Application folder are owned by system.
Also, security sensitive system binaries are still stored in /bin and /sbin in Mac OS X.
Page 31
The ability to read the contacts stored in Address Book could be used by a worm to propagate. But, malware that uses this to spread is not likely to appear in the wild if the malware is not profitable. It is unlikely that malware will be profitable without being able to hook (this is a specific function) into apps owned by system.
Page 33
Starts off talking about trojans, trojans are easily avoided with user knowledge in Mac OS X because most apps do not require authentication to install if installed in the appropriate location where the Unix DAC model protects the system.
Viruses using the model shown in the article will not be successful without privilege escalation. This is the reason why Mac OS X malware is not successful in the wild.
By default, very few server side services are exposed in Mac OS X and those that are exposed are sandboxed. Vectors for worm propagation are limited to client side. Client side worms require authentication to install and spread if do not include privilege escalation via exploitation because of the Unix DAC model used in Mac OS X. Trojans used to trick users to authenticate are less likely to be successful in Mac OS X as stated above.
cwt1nospam
Mar 16, 09:19 PM
It this utter ignorance and false sense of security in the Mac user base that I would use to my advantage if I were a cyber-criminal.
Many have tried. Most — probably all, but I'll leave that open — have failed. I can be completely ignorant or completely aware, but my options remain the same: perform system updates as they become available.
AV software is an unnecessary expense both monetarily and computationally. It offers no additional protection beyond that provided by the OS, and if some day some one does develop a successful virus I'll probably download the patch from Apple long before the virus ever attempts to compromise my system, so even then AV software is still a waste of money and computing power.
By the way, I've been using OS X since "Cheetah (http://en.wikipedia.org/wiki/Mac_OS_X)" in March of 2001. Ever since then I've been told that I need to prepare for the day when the OS would come under attack. Here we are ten years later and I'm still waiting. I will not be surprised if I'm still waiting in 2021.
Many have tried. Most — probably all, but I'll leave that open — have failed. I can be completely ignorant or completely aware, but my options remain the same: perform system updates as they become available.
AV software is an unnecessary expense both monetarily and computationally. It offers no additional protection beyond that provided by the OS, and if some day some one does develop a successful virus I'll probably download the patch from Apple long before the virus ever attempts to compromise my system, so even then AV software is still a waste of money and computing power.
By the way, I've been using OS X since "Cheetah (http://en.wikipedia.org/wiki/Mac_OS_X)" in March of 2001. Ever since then I've been told that I need to prepare for the day when the OS would come under attack. Here we are ten years later and I'm still waiting. I will not be surprised if I'm still waiting in 2021.
brepublican
Sep 19, 03:39 PM
This is a great start for Apple and should help sway studios that are still on the fence. Doesnt mean I'm biting though, only thing that'll get me to seriously think of buying a movie would be nothing less than a 720 x 480 reso. I might get impulsive if there are more offerings. Maybe.
I think Apple should seriously consider offering rentals too. Its dumb not to try it out :)
I think Apple should seriously consider offering rentals too. Its dumb not to try it out :)
bigbossbmb
Aug 28, 05:52 PM
So with all this dumping going on, Apple better have at least equal hardware. They were first out with the core 2 duo xeon and with yonah.
I don't know about woodcrest...but they were definitely not the first with yonah.
I don't know about woodcrest...but they were definitely not the first with yonah.
NickFalk
Apr 29, 12:25 AM
You do realize that this image could end up biting Apple in the butt? In 3 years time the iPad will be where the iPhone is now: Loosing some (not all) of its marketshare to the knockoffs.
FloatingBones
Apr 20, 01:18 PM
This is a huge concern because of the use by law enforcement (http://news.cnet.com/8301-17938_105-20055431-1.html) of the Cellebrite device to download and scrutinize the data in cell phones. Apparently, police departments in Michigan are using this device when pulling drivers on traffic violations. Here (http://www.thenewspaper.com/news/34/3458.asp) is another article on the use in Michigan.
Cellebrite's widget is apparently able to download and scrutinize (http://www.cellebrite.com/news-and-events/press-releases/190-cellebrite-releases-ufed-physical-analyzer-version-20-the-new-standard-for-mobile-phone-forensics-.html) the data from a vast variety of mobile devices, including Blackberry phones and the iPhone.
Isn't this illegal search and seizure?
The ACLU is trying to get records from the Michigan State Police are using the devices under the FOIA. The MSP says that complying with the FOIA request would cost them money; they are asking for over $500,000 to provide the information.
Read the articles I referenced above. I'd also recommend looking on the ACLU site to see what they have to say.
Cellebrite's widget is apparently able to download and scrutinize (http://www.cellebrite.com/news-and-events/press-releases/190-cellebrite-releases-ufed-physical-analyzer-version-20-the-new-standard-for-mobile-phone-forensics-.html) the data from a vast variety of mobile devices, including Blackberry phones and the iPhone.
Isn't this illegal search and seizure?
The ACLU is trying to get records from the Michigan State Police are using the devices under the FOIA. The MSP says that complying with the FOIA request would cost them money; they are asking for over $500,000 to provide the information.
Read the articles I referenced above. I'd also recommend looking on the ACLU site to see what they have to say.
racer1441
Apr 4, 12:38 PM
Good on the cop. Criminals are scum. Got what he deserved.
Shenaniganz08
Mar 23, 07:12 PM
If you're sober enough to have presence of mind to check an app for a sobriety checkpoint, you're probably sober enough to drive.
umm no
umm no
No comments:
Post a Comment