ctdonath
Apr 15, 09:52 AM
Focus should be on ending/surviving ALL bullying, not just victims choosing a hip counterculture.
Icy1007
Apr 8, 11:21 PM
This is great and all, but Apple should start supporting gaming on Mac OS X more. First step would be to improve their implementation of OpenGL.
janstett
Sep 12, 05:46 PM
Ah, now this is what I've been waiting for: the Airport Express for video, plus a little bit more. If it were shipping today, I'd high-tail it to the Apple Store and buy one. But given a few months to think about the $299 price tag, we shall see if that feeling holds up.
These types of devices have existed for years (UPnP Digital Media Adapters). I wonder if this will be UPnP compatible, probably not -- Rendevous pretty much a UPnP alternative.
These types of devices have existed for years (UPnP Digital Media Adapters). I wonder if this will be UPnP compatible, probably not -- Rendevous pretty much a UPnP alternative.
babyj
Sep 20, 12:11 PM
What do you do with your Xbox that would been relevant to watching videos on your TV?
Can you load Vids onto the Xbox HD and play them??
If you fit a mod chip to an Xbox it allows you to do lots of cool things, including upgrading the hard drive and run non certified software (eg homebrew, open source).
Probaby the most popular is Xbox Media Centre, which is what it says and does it pretty well. So for about £150 you end up with a decent media centre which isn't bad, plus its a game console as well.
Can you load Vids onto the Xbox HD and play them??
If you fit a mod chip to an Xbox it allows you to do lots of cool things, including upgrading the hard drive and run non certified software (eg homebrew, open source).
Probaby the most popular is Xbox Media Centre, which is what it says and does it pretty well. So for about £150 you end up with a decent media centre which isn't bad, plus its a game console as well.
Rt&Dzine
Apr 24, 12:05 PM
It's about power and control- nothing more.
And Fear.
And Fear.
jamespa66
Mar 18, 09:33 AM
They can detect in a lot of way, for instance since you can't use flash on an iphone or iPad, if they see lots of flash stuff they you are probably tethering, also certain popular sites detect mobile devices and send the mobile version of the site if you are loading the full versions of those sites they could detect tethering, these are only a couple of simple things but there are plenty more, so I don't think this is going to be limited to the latest iOS.
Just my thought on the matter.
Easiest way is for them to sniff the network traffic and look at the packets, the origination machines MAC address is listed. If the MAC address is not in the Apple iPhone list of MAC addresses then it is obviously coming from a tethered machine.
Just my thought on the matter.
Easiest way is for them to sniff the network traffic and look at the packets, the origination machines MAC address is listed. If the MAC address is not in the Apple iPhone list of MAC addresses then it is obviously coming from a tethered machine.
deannnnn
Oct 7, 06:09 PM
Competition is gooooood.
neko girl
Apr 26, 10:14 PM
Thread topic reminds me of:
http://gurugilbert.com/wp-content/jerry_seinfeld.jpg
http://gurugilbert.com/wp-content/jerry_seinfeld.jpg
WestonHarvey1
Apr 15, 09:46 AM
This is an excellent initiative. Bullying goes on beyond high school and college too. You see it everywhere. There are parts of our cities where it's just unsafe for any of them to go walking alone, just because of how their sexuality is perceived by the ignorant and thuggish class. I think that's sad - clearly there's still a long road ahead.
Good on Apple employees - and all others who partnered in this initiative - for speaking up.
Maybe the next generation will be the one that shrugs its shoulders when discussion of sexual orientation comes up, like it's no big deal, because no one really sees it as a major social issue anymore. Maybe then the bullying will stop, having lost a target.
But see, aren't you really showing what this is all about? This has nothing to do with bullying. It's just more identity politics from a powerful pressure group or "community".
This is about getting members of your "community" to band together and balkanize themselves. It's about increasing membership, not taking on bullying.
Bullying is a generic problem - why you're being bullied doesn't matter, it all comes from the same place. Bullies bully to elevate their own social status - because it works. They don't actually care that you're gay. It's not some big homophobic conspiracy. Later on in life, most of them will probably have a beer with you and apologize.
If you want to really take on bullying, you need a totally different kind of campaign.
Good on Apple employees - and all others who partnered in this initiative - for speaking up.
Maybe the next generation will be the one that shrugs its shoulders when discussion of sexual orientation comes up, like it's no big deal, because no one really sees it as a major social issue anymore. Maybe then the bullying will stop, having lost a target.
But see, aren't you really showing what this is all about? This has nothing to do with bullying. It's just more identity politics from a powerful pressure group or "community".
This is about getting members of your "community" to band together and balkanize themselves. It's about increasing membership, not taking on bullying.
Bullying is a generic problem - why you're being bullied doesn't matter, it all comes from the same place. Bullies bully to elevate their own social status - because it works. They don't actually care that you're gay. It's not some big homophobic conspiracy. Later on in life, most of them will probably have a beer with you and apologize.
If you want to really take on bullying, you need a totally different kind of campaign.
kdawg
Apr 6, 11:39 PM
Finder - It works different from explorer. Not better, Not worse. Different. Both have features that the other is lacking
The lack of embedded shortcut keys in system menus. Especially to activate them File Open Etc Etc. I used them all the time... Especially with a dialog box for Open or Cancel or Save an Cancel on Pop-up dialog boxes. You cannot tab or arrow through the choices.
No right click without an external mouse. Apple's solution on the multitouch pad is buggy - Still drives me nuts after all these years.
The lack of embedded shortcut keys in system menus. Especially to activate them File Open Etc Etc. I used them all the time... Especially with a dialog box for Open or Cancel or Save an Cancel on Pop-up dialog boxes. You cannot tab or arrow through the choices.
No right click without an external mouse. Apple's solution on the multitouch pad is buggy - Still drives me nuts after all these years.
puma1552
Mar 11, 08:18 AM
Japanese police are reporting several hundred bodies on a beach near Sendai so it looks like as per the Indonesian tsunami the official toll will skyrocket once the water recedes.
Link?
To get an idea of how massive this one was, I am in Himeji, and just an hour east of me, in Osaka, buildings were swaying. Now if you look at a map of where the quake is and how far away Osaka is, my god.
Link?
To get an idea of how massive this one was, I am in Himeji, and just an hour east of me, in Osaka, buildings were swaying. Now if you look at a map of where the quake is and how far away Osaka is, my god.
MacCoaster
Oct 9, 06:06 PM
Originally posted by Backtothemac
Dude, I am a microsoft certified professional and spend all day dealing with PC problems. I have worked on the slowest ones and the fastest ones. The dual power macs fly! On top of that they do not run winblows. PC's suck because of the OS period. My mind will never be changed on that because I have almost 2 decades of dealing with Microsoft's crap!
Then use FreeBSD on the PC. FreeBSD ****in' flies. PCs don't suck. A particular OS does.
Dude, I am a microsoft certified professional and spend all day dealing with PC problems. I have worked on the slowest ones and the fastest ones. The dual power macs fly! On top of that they do not run winblows. PC's suck because of the OS period. My mind will never be changed on that because I have almost 2 decades of dealing with Microsoft's crap!
Then use FreeBSD on the PC. FreeBSD ****in' flies. PCs don't suck. A particular OS does.
flopticalcube
Mar 13, 01:59 PM
Perfectly fine using the new designs that run safer and can even recycle their own waste. I would not have dismissed the entire car industry just because the early models lacked safety features and had high fatality and breakdown rates. It's early days still for the nuclear power industry. We do need to work on uranium mining and milling practices, however.
Bill McEnaney
Mar 27, 07:09 AM
You have completely missed the point.
That doesn't surprise me. Please tell me exactly what point I missed.
That doesn't surprise me. Please tell me exactly what point I missed.
nagromme
Aug 29, 11:03 AM
Boo hoo. its a business, waht do they realistically expect?
They expect them to do better--at least as well as other companies do, and ultimately better than that.
And we should thank Greenpeace et al for putting this kind of pressure on companies: it helps all of us. These are serious issues, and they are issues that CAN be solved without companies ceasing to do business ;)
I'm glad for what Apple has done so far, and I'm glad people are pushing them to do more.
The "never criticize a business, their profit matters more than anything in the world" attitude is a little extreme if you stop to think about it. By that logic, we should accept products without warranties, toys that shatter into sharp pieces, batteries that catch fire, poisons in foods, slave labor, pollution... ANYTHING so long as it is in some corporations interest.
But corporations aren't the only thing that matters (despite their hold on certain governing bodies ;) ).
They expect them to do better--at least as well as other companies do, and ultimately better than that.
And we should thank Greenpeace et al for putting this kind of pressure on companies: it helps all of us. These are serious issues, and they are issues that CAN be solved without companies ceasing to do business ;)
I'm glad for what Apple has done so far, and I'm glad people are pushing them to do more.
The "never criticize a business, their profit matters more than anything in the world" attitude is a little extreme if you stop to think about it. By that logic, we should accept products without warranties, toys that shatter into sharp pieces, batteries that catch fire, poisons in foods, slave labor, pollution... ANYTHING so long as it is in some corporations interest.
But corporations aren't the only thing that matters (despite their hold on certain governing bodies ;) ).
ddtlm
Oct 11, 01:45 AM
javajedi:
70-ish seconds navtive on a G3
90-ish seconds on a native on a G4
5.9-6-ish seconds running under JVM 1.4.1 on a P4
Admittedly I am getting lost in what all the numbers people have mentioned are for, but looking at these numbers you have here and assuming that they are doing the same task, you can rest assured that the G3/G4 are running far inferior software. AltiVec and SSE2 or not, there is just nothing that can explain this difference other than an unfair playing field. There is no task that a P4 can do 11x or 12x the speed of a G4 (comparing top-end models here). The P4 posseses nothing that runs at 11x or 12x the speed. Not the clock, not the units, the bandwidth to memory and caches are not 11x or 12x as good, it is not 11x better at branch prediction. I absolutely refuse to accept these results without very substantial backing because they contradict reality as I know it. I know a lot about the P4 and the G4, and I know a lot about programming in a fair number of different languages, even some assembly. I insist that these results do not reflect the actual performance of the processors, until irrefutable proof is presented to show how they do.
I guess the 70 and 90 don't surprise me a lot for the G3/G4, depending on clock speed difference. But all this trendy wandwagon-esque G4-bashing is not correct just cause every one else is doing it. There are things about the G3 that are very nice, but the G4 is no slouch compared to it, and given the higher clock that it's pipeline allows, the G3 really can't keep up. The G4 not only sports a better standard FPU, but it also sports better integer units.
70-ish seconds navtive on a G3
90-ish seconds on a native on a G4
5.9-6-ish seconds running under JVM 1.4.1 on a P4
Admittedly I am getting lost in what all the numbers people have mentioned are for, but looking at these numbers you have here and assuming that they are doing the same task, you can rest assured that the G3/G4 are running far inferior software. AltiVec and SSE2 or not, there is just nothing that can explain this difference other than an unfair playing field. There is no task that a P4 can do 11x or 12x the speed of a G4 (comparing top-end models here). The P4 posseses nothing that runs at 11x or 12x the speed. Not the clock, not the units, the bandwidth to memory and caches are not 11x or 12x as good, it is not 11x better at branch prediction. I absolutely refuse to accept these results without very substantial backing because they contradict reality as I know it. I know a lot about the P4 and the G4, and I know a lot about programming in a fair number of different languages, even some assembly. I insist that these results do not reflect the actual performance of the processors, until irrefutable proof is presented to show how they do.
I guess the 70 and 90 don't surprise me a lot for the G3/G4, depending on clock speed difference. But all this trendy wandwagon-esque G4-bashing is not correct just cause every one else is doing it. There are things about the G3 that are very nice, but the G4 is no slouch compared to it, and given the higher clock that it's pipeline allows, the G3 really can't keep up. The G4 not only sports a better standard FPU, but it also sports better integer units.
skunk
Apr 24, 06:20 PM
The muslim extremists in my country always get supported by those who call themselves "moderate muslims". Probably because of some "solidarity" (blind obedience) code within the ummah. When they gang up together like that on controversial issues, it's very easy to see them all as extremists. That's how they strive to appear, even when they're not.That's the trouble with the Word of God�: it's just not negotiable. 7th century rules.
ReanimationLP
Oct 14, 03:38 PM
Wow, the Quad Xeon is the Pentium D all over again!
The Quad Xeon is two Dual Xeons glued together, and the Pentium D was two Pentium 4s glued together.
Its still faster than the Dual Xeons, but it isnt as good as it can be.
The Quad Xeon is two Dual Xeons glued together, and the Pentium D was two Pentium 4s glued together.
Its still faster than the Dual Xeons, but it isnt as good as it can be.
samdweck
Oct 7, 04:28 PM
Originally posted by alex_ant
Won't happen. To a Mac zealot, if the G4 is slower than anything, either 1) the benchmark was rigged, or 2) "pcheese" and "Windblowz" suck anyway.
The Pentium 5 could come along and deliver 15,000 in SPECfp and all the Mac zealots would be whining about how SPEC isn't a real-world benchmark and how Macs deliver such better real-world performance etc., even when they have nothing to substantiate their claims but the biased and selective evidence from themselves and their Mac-using friends.
I love Macs, but I harbor no illusions about them not generally being just about the slowest thing on the block at the moment.
Alex
mac rules, pc sucks, how hard is this? if you dont' agree, why are you on a site devoted to macs? leave now!!!!!!! (not u alex... lol)
Won't happen. To a Mac zealot, if the G4 is slower than anything, either 1) the benchmark was rigged, or 2) "pcheese" and "Windblowz" suck anyway.
The Pentium 5 could come along and deliver 15,000 in SPECfp and all the Mac zealots would be whining about how SPEC isn't a real-world benchmark and how Macs deliver such better real-world performance etc., even when they have nothing to substantiate their claims but the biased and selective evidence from themselves and their Mac-using friends.
I love Macs, but I harbor no illusions about them not generally being just about the slowest thing on the block at the moment.
Alex
mac rules, pc sucks, how hard is this? if you dont' agree, why are you on a site devoted to macs? leave now!!!!!!! (not u alex... lol)
OllyW
Apr 28, 08:52 AM
However, tablets are PCs.
We'll have to disagree on that one. :)
We'll have to disagree on that one. :)
Cougarcat
May 2, 12:30 PM
That's one of the simple lines of defense for a user, as it lets them know they're about to open a newly-downloaded app. It only does that the first time you launch the app, so why bother disabling such a helpful reminder?
It's not "helpful." I don't need to be "reminded" the file I downloaded a second ago was downloaded from the internet. I'm sure others find it useful, but for me, it's pointless and annoying..
Just a simple "do not warn me about downloaded files again" tickbox in the dialog would be nice.
Until then, I just discovered that this terminal command will do the trick:
defaults write com.apple.LaunchServices LSQuarantine -bool NO
It's not "helpful." I don't need to be "reminded" the file I downloaded a second ago was downloaded from the internet. I'm sure others find it useful, but for me, it's pointless and annoying..
Just a simple "do not warn me about downloaded files again" tickbox in the dialog would be nice.
Until then, I just discovered that this terminal command will do the trick:
defaults write com.apple.LaunchServices LSQuarantine -bool NO
bokdol
May 2, 01:57 PM
i just cleaned out of the the computers at work. and the person had the installer window still open. they pressed ok but because they had 10 other windows open they really did not realize they authorized it to install.
it is not that they did not authorize it's that their computer had soo much stuff on they did not realize they authorized it.
it is not that they did not authorize it's that their computer had soo much stuff on they did not realize they authorized it.
leekohler
Mar 28, 03:22 AM
It's one thing to say whether popes cared whether those artists were "gay." It's quite another to say that the popes thought the homosexuality of those artists was relevant to whether they thought they they would hire them. If I wanted someone to paint a mural in my home, I would be willing to hire a gay artist. But I still wouldn't accept gay sex. Neither would any orthodox pope.
I'm sorry, but who says you have to have gay sex? Obviously, it's what made those artists happy, but ultimately it's none of your or anyone else's business. Why you constantly try to make it your business is puzzling.
Then I don't know what you mean by "accept."
Oh- I most certainly do. It means, "Be who you are, just don't act like who you are." It's quite clear. And if me loving another human being and building a life with them makes your god angry, so be it. I have no use for that god. I'd rather spend eternity in hell than spend eternity with something that horrible and judgemental. Fortunately, "god" does not exist, and when we die, we die. While I'm here, I will make the most of my life and help others do the same. You can do what you want.
I'm sorry, but who says you have to have gay sex? Obviously, it's what made those artists happy, but ultimately it's none of your or anyone else's business. Why you constantly try to make it your business is puzzling.
Then I don't know what you mean by "accept."
Oh- I most certainly do. It means, "Be who you are, just don't act like who you are." It's quite clear. And if me loving another human being and building a life with them makes your god angry, so be it. I have no use for that god. I'd rather spend eternity in hell than spend eternity with something that horrible and judgemental. Fortunately, "god" does not exist, and when we die, we die. While I'm here, I will make the most of my life and help others do the same. You can do what you want.
munkery
May 2, 08:18 PM
Problems with Windows security in comparison to Mac OS X presented just in this thread:
1) Greater number of privilege escalation vulnerabilities:
Here is a list of privilege escalation (UAC bypass) vulnerabilities just related to Stuxnet (win32k.sys) in Windows in 2011:
http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=win32k.sys+2011
Here is a list of all of the privilege escalation vulnerabilities in Mac OS X in 2011:
http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=Mac+OS+X+privileges+2011
2) Earlier versions of NT based Windows (Windows XP and earlier) do not use discretionary access controls by default.
3) Permissions system does not include a user defined unique identifier (password) by default. More susceptible to user space exploitation leading to authentication stolen via spoofed prompt that appears unrelated to UAC because password not associated with authentication.
4) Windows sandbox mechanism relies on inherited permissions so that turning off UAC turns off the sandbox. This sandbox has been defeated in the wild (in the last two pwn2owns).
I do not know of any TrustedBSD MAC framework (BSD and Mac sandbox), AppArmor (openSUSE and Ubuntu), or SE Linux (Fedora) mandatory access control escapes? These sandbox mechanisms do not rely on inherited permissions.
5) The Windows registry is a single point of failure that can be leveraged by malware.
EDIT:
If malware doesn't need to use some method to achieve privilege escalation or actively phish users for their credit card number to be profitable enough to warrant their creation, then why did the specific example of malware that started this thread rely on these methods to be profitable?
Why did it not use the methods presented by KnightWRX? Why do you not see malware that only uses user level access to upload a user's data files to achieve some effect that is profitable? I can't recall any malware that uses this method.
Is it because most users do not have valuable info stored in insecure data files? I keep that type of info in encrypted secured notes in Keychain Access or in encrypted sparse bundle disk images.
Is it because it would require too much time to data mine the files for valuable info in relation to the amount of profit gained? How many GBs of data are on your system? Even the data I keep in encrypted sparse bundle disk images wouldn't be very useful for identity theft even if it was not encrypted.
Is it because given all the variables it is more cost effective to go after achieving system level access to keystroke log passwords protected by user space security mechanisms or simply to use basic phishing scams on unknowledgeable users? Makes sense to me but maybe I am wrong.
1) Greater number of privilege escalation vulnerabilities:
Here is a list of privilege escalation (UAC bypass) vulnerabilities just related to Stuxnet (win32k.sys) in Windows in 2011:
http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=win32k.sys+2011
Here is a list of all of the privilege escalation vulnerabilities in Mac OS X in 2011:
http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=Mac+OS+X+privileges+2011
2) Earlier versions of NT based Windows (Windows XP and earlier) do not use discretionary access controls by default.
3) Permissions system does not include a user defined unique identifier (password) by default. More susceptible to user space exploitation leading to authentication stolen via spoofed prompt that appears unrelated to UAC because password not associated with authentication.
4) Windows sandbox mechanism relies on inherited permissions so that turning off UAC turns off the sandbox. This sandbox has been defeated in the wild (in the last two pwn2owns).
I do not know of any TrustedBSD MAC framework (BSD and Mac sandbox), AppArmor (openSUSE and Ubuntu), or SE Linux (Fedora) mandatory access control escapes? These sandbox mechanisms do not rely on inherited permissions.
5) The Windows registry is a single point of failure that can be leveraged by malware.
EDIT:
If malware doesn't need to use some method to achieve privilege escalation or actively phish users for their credit card number to be profitable enough to warrant their creation, then why did the specific example of malware that started this thread rely on these methods to be profitable?
Why did it not use the methods presented by KnightWRX? Why do you not see malware that only uses user level access to upload a user's data files to achieve some effect that is profitable? I can't recall any malware that uses this method.
Is it because most users do not have valuable info stored in insecure data files? I keep that type of info in encrypted secured notes in Keychain Access or in encrypted sparse bundle disk images.
Is it because it would require too much time to data mine the files for valuable info in relation to the amount of profit gained? How many GBs of data are on your system? Even the data I keep in encrypted sparse bundle disk images wouldn't be very useful for identity theft even if it was not encrypted.
Is it because given all the variables it is more cost effective to go after achieving system level access to keystroke log passwords protected by user space security mechanisms or simply to use basic phishing scams on unknowledgeable users? Makes sense to me but maybe I am wrong.
No comments:
Post a Comment