Starting today August 7th, 2024, in order to post in the Married Couples, Courting Couples, or Singles forums, you will not be allowed to post if you have your Marital status designated as private. Announcements will be made in the respective forums as well but please note that if yours is currently listed as Private, you will need to submit a ticket in the Support Area to have yours changed.
Now I see there was a typo, I was not supposed to write "stopp getting bored". I'm a bit tired as it's past midnight over here now, a $2 bottle of apple vinegar just fell on the floor.
I had heard that Mac's are very difficult to hack. Is that true?
Thanks.....what does that mean?
I like most Apple products. My only problem is with some of the security features, designed to help prevent theft, but that can cause problems for honest people. My bag with my iphone, ipad, so much else, was stolen right after I arrived in the US for a year abroad. I bought a replacement ipad from a girl, who seemed legitimate. We met, I checked it out. It worked perfectly, was in good condition. Then I did a restore, to make sure all of her personal information was gone. It asked for her Apple ID and password, which I did not have. I couldn't contact her, as with craigslist, the anon emails people use for selling things stops working after the ad has been deleted. The Apple ID doesn't show the full email address, so I couldn't contact her. I think she didn't know that she had to disconnect the account, as a friend hadn't either when she sold her ipad and the buyer contacted her. I have a very expensive paperweight, lol.
How do I get a Xiaomi device in the U.S.?
While consumers in countries such as China, Singapore, Malaysia and India can order directly from Xiaomi via the Mi.com website, U.S. residents cannot. But you can still get a Xiaomi device via retailers and importers, such as Newegg and DHGate, for a small fee. Shipping a product, such as the $20 MI Band, via www.xiaomishop.com costs $22. Even after including that cost, though, Xiaomi products are still a steal.
I can't tell you how many projects I lost because of hardware or software issues.
On paper those PC's should've smoked the Mac's, but I'm just convinced there's no substitution for how well macs are put together and how well they integrate with their platform.
When you're dealing with massive amounts of data, like real time editing of uncompressed HD, 4K, 5K or 6K footage, you really don't want to risk that footage on an unstable system so the cost of a Mac more than pays for itself in that respect alone.
I've heard this statement before from other Mac users, and I find it hard to believe. I've been working on Windows machines since 1995 and I have yet to lose one single photo, print or video project.
I can build a better PC for what it cost to purchase a Mac. That PC will also blow away the Mac in any real life performance tests.
That's just plain ridiculous. Since I can purchase the same hardware that's in a Mac and put it in a vanilla case, then the only argument you really have is that OSX is a better operating system...and even that is subjective.
I have Windows XP in a virtual machine, and native: Vista, 7, 8.0, 8.1. The 8.0 machine is the most comfortable to use and fastest - partially due to that it came with adequate RAM (12 GB) and no password, but Windows 7 is the one which supports my Bible Study softwares in the best way (all of them except one where have only one book and cheap Greek audio vocabulary cards software). [...]
Unix said:Hacking a computer is usually done with malware, keyloggers and viruses, if the market share is small most won't see the effort as worthwhile - as I've understood it what operative system someone has is not the first thing hackers find out:
EDIT: this is the post I was responding to, I found it on page 2:You misunderstood me. I meant that you can actually customize a PC to your liking cheaply and easily.
Thank you for sharing with a novice computer person, Unix. I had heard that Mac's are very difficult to hack. Is that true?
Six university researchers have revealed deadly zero-day flaws in Apple's iOS and OS X, claiming it is possible to crack Apple's password-storing keychain, break app sandboxes, and bypass its App Store security checks.
Attackers can steal passwords from installed apps, including the native email client, without being detected, by exploiting these bugs.
The team was able to upload malware to the Apple app store, passing the vetting process without triggering alerts. That malware, when installed on a victim's device, raided the keychain to steal passwords for services including iCloud and the Mail app, and all those stored within Google Chrome.
Lead researcher Luyi Xing told El Reg he and his team complied with Apple's request to withhold publication of the research for six months, but had not heard back as of the time of writing.
They say the holes are still present in Apple's software, meaning their work will likely be consumed by attackers looking to weaponize the work.
Apple was not available for immediate comment.
The Indiana University boffins Xing; Xiaolong Bai; XiaoFeng Wang; and Kai Chen joined Tongxin Li, of Peking University, and Xiaojing Liao, of Georgia Institute of Technology, to develop the research, which is detailed in a paper titled Unauthorized Cross-App Resource Access on MAC OS X and iOS.
"Recently we discovered a set of surprising security vulnerabilities in Apple's Mac OS and iOS that allows a malicious app to gain unauthorised access to other apps' sensitive data such as passwords and tokens for iCloud, Mail app and all web passwords stored by Google Chrome," Xing told The Register's security desk.
"Our malicious apps successfully went through Apple’s vetting process and was published on Apple’s Mac app store and iOS app store.
"We completely cracked the keychain service - used to store passwords and other credentials for different Apple apps - and sandbox containers on OS X, and also identified new weaknesses within the inter-app communication mechanisms on OS X and iOS which can be used to steal confidential data from Evernote, Facebook and other high-profile apps."
The team was able to raid banking credentials from Google Chrome on the latest Mac OS X 10.10.3, using a sandboxed app to steal the system's keychain data and secret iCloud tokens, and passwords from password vaults.
Photos were stolen from WeChat, and the token for popular cloud service Evernote was nabbed, allowing it to be fully compromised.
"The consequences are dire," the team wrote in the paper.
Some 88.6 per cent of 1,612 Mac and 200 iOS apps were found "completely exposed" to unauthorized cross-app resource access (XARA) attacks allowing malicious apps to steal otherwise secure data.
Xing says he reported the flaws to Apple in October 2014.
Apple security bods responded to the researchers in emails seen by El Reg expressing understanding for the gravity of the attacks, and asked for at least six months to fix the problems. In February, the Cupertino staffers requested an advanced copy of the research paper.
Google's Chromium security team was more responsive, and removed keychain integration for Chrome, noting that it could likely not be solved at the application level.
AgileBits, owner of popular software 1Password, said it could not find a way to ward off the attacks or make the malware "work harder" some four months after it was warned of the vulnerabilities.
The team's work into XARA attacks is the first of its kind; Apple's app isolation mechanisms are supposed to stop malicious apps from raiding each other. The researchers found "security-critical vulnerabilities" including cross-app resource-sharing mechanisms and communications channels such as the keychain, WebSocket and Scheme.
"Note that not only does our attack code circumvent the OS-level protection but it can also get through the restrictive app vetting process of the Apple Stores, completely defeating its multi-layer defense," the researchers wrote in the paper.
They say almost all XARA flaws arise from Apple's cross-app resource sharing and communication mechanisms such as keychain for sharing passwords, BID based separation, and URL scheme for app invocation, which is different from how the Android system works.
Their research, previously restricted to Android, would lead to a new line of work for the security community studying how the vulnerabilities affect Apple and other platforms.
Here's the boffins' description of their work:
Our study brings to light a series of unexpected, security-critical aws that can be exploited to circumvent Apple's isolation protection and its App Store's security vetting. The consequences of such attacks are devastating, leading to complete disclosure of the most sensitive user information (e.g., passwords) to a malicious app even when it is sandboxed.
Such findings, which we believe are just a tip of the iceberg, will certainly inspire the follow-up research on other XARA hazards across platforms. Most importantly, the new understanding about the fundamental cause of the problem is invaluable to the development of better app isolation protection for future OSes.
In-depth technical details are available in the aforementioned paper. ®
We use cookies and similar technologies for the following purposes:
Do you accept cookies and these technologies?
We use cookies and similar technologies for the following purposes:
Do you accept cookies and these technologies?