Apple... is it going rotten..?
Discussion
Mardybum said:
Podie said:
Apple less secure than Microsoft... http://www.techeye.net/security/apple-has-the-most...
Speaking of malware vulnerabilities.......http://www.guardian.co.uk/technology/2010/jul/22/m...
_dobbo_ said:
Mardybum said:
Podie said:
Apple less secure than Microsoft... http://www.techeye.net/security/apple-has-the-most...
Speaking of malware vulnerabilities.......http://www.guardian.co.uk/technology/2010/jul/22/m...
Rotten ..not much cant believe you can sync your new iphone4 with itunes on a windoze OS up to 7 years old and cant on a mac using a tiger osx ( I dunno 3 yrs old?) Thast looking after your faithful mac owners they either have to use windoze..or buy snow leopard osx for 30 odd quid and if your machine is capable of handling the new osx its either by more hardware for you mac or a new mac....Nice one Steve Jobs youve finally finished selling your soul
BB
BB
tinman0 said:
Not following. You spend £600 on a new phone over a 2 year contract or so, but can't be bothered to spend £30 on Snow Leopard?
Face it, everyone has to cut off old kit and old OSes at some point. Backward compatibility is an ever decreasing circle.
I take your point, but it's still a bit odd that it supports much older versions of Windows than it does of OSX. Almost as though there's no benefit in Apple forcing Windows users to buy a new version of Windows. Face it, everyone has to cut off old kit and old OSes at some point. Backward compatibility is an ever decreasing circle.
In the same vein, my G5 iMac came with (I think) Panther, and a white plastic Apple keyboard which had volume keys that, unsurprisingly, controlled the volume.
That keyboard died and was replaced with a shiny new aluminium Apple keyboard, which also had volume keys. Except that the volume keys on the new keyboard didn't work with Panther, and required a new version of the OS. Not a firmware update, not a new driver, a new version of the Operating System. To provide the same functionality as the old keyboard already provided. Hmmm...
Ballistic Banana said:
£30 yeah if your mac can handle the new osx..mine can/did as its quite hi spec'd when I bought it a few years ago..Some ppls aren't though. And they may be able to afford a new phone but not a new PC/Mac.
BB
10.6 runs on any Intel machine. Apple did state quite few years ago that they were phasing out the PPC based Mac's. That said, the old G5's and whatnot still hold their price quite well, I sold a dual core G5 PowerMac for £750 at the beginning of the year.BB
That said if you still have a G5 it'll run 10.5 and will work with your new phone.
To all the people talking about passwords. This: http://agilewebsolutions.com/products/1Password
is the solution. Include password generation and vault capability. Sync's using dropbox between my 2 Macbooks and iPhone.
Works perfectly and is pretty secure, especially when your allowed 50 character passwords.
is the solution. Include password generation and vault capability. Sync's using dropbox between my 2 Macbooks and iPhone.
Works perfectly and is pretty secure, especially when your allowed 50 character passwords.
Mardybum said:
_dobbo_ said:
Mardybum said:
Podie said:
Apple less secure than Microsoft... http://www.techeye.net/security/apple-has-the-most...
Speaking of malware vulnerabilities.......http://www.guardian.co.uk/technology/2010/jul/22/m...
fieldl said:
To all the people talking about passwords. This: http://agilewebsolutions.com/products/1Password
is the solution. Include password generation and vault capability. Sync's using dropbox between my 2 Macbooks and iPhone.
Works perfectly and is pretty secure, especially when your allowed 50 character passwords.
Pretty secure, except for when someone manages to get your one password they will then have access to absolutely everything.is the solution. Include password generation and vault capability. Sync's using dropbox between my 2 Macbooks and iPhone.
Works perfectly and is pretty secure, especially when your allowed 50 character passwords.
Considering very few passwords are "hacked" theses days (most are compromised via phishing and other social engineering attacks) it seems like the wrong way to go about things to me.
Tonsko said:
Mr Will said:
Pretty secure, except for when someone manages to get your one password they will then have access to absolutely everything.
Would require a keylogger...not without the realms of possibility, but unlikely if you take care.Again, yes. But then if someone has thought about it enough to start using a password program so they can use different 20-30+ character passwords for everything, does it not follow that they will also 'take care' when it comes to guarding themselves against keyloggers?
Edited by Tonsko on Monday 26th July 11:09
Tonsko said:
Again, yes. But then if someone has thougth about it enough to start using a password program so they can use different 20-30+ character passwords for everything, does it not follow that they will also 'take care' when it comes to guarding themselves against keyloggers?
Someone techie, yes, but if I advised my dad to use this program then it wouldn't help in the slightest and the main password (which now gets you into absolutely everything) would still be written on a post-it note stuck to his monitor.Tonsko said:
A non-techie is unlikely to use a program like this. Which is kind of the point. They are pretty much exclusive... hence someone who uses one is likely to understand defense in depth.
someone who understands defense in depth... and wants to add a single point of failure to their security set-up.Sorry, I'm not convinced. I'll stick to strong passwords stored in my head for everything which matters and a "throw-away" shared password for stuff which doesn't.
Hm. I suspect we're never going to agree.
There is a single point of failure in most setups. What matters is how you mitigate that by surrounding the single point of failure with layers of other security. Like an onion. A security onion. A big juicy, eye-watering security onion of delight.
More seriously, I prefer the single point of failure of a password program, as long as I'm aware of the possible attack vectors, I can try and guard against that. One will never be totally secure - if you are targeted for whatever reason, you will get done. The goal is simply to make you a harder target than the next person.
After all, you keeping your passwords in your head is still a point of failure if a keylogger is installed - we both become exposed to the same weakness. Your security controls that prevent your passwords from being stolen are essentially the same as mine - guarding your machine from unauthorised access to install a program. If those controls are bypassed, they get both our passwords.
There is a single point of failure in most setups. What matters is how you mitigate that by surrounding the single point of failure with layers of other security. Like an onion. A security onion. A big juicy, eye-watering security onion of delight.
More seriously, I prefer the single point of failure of a password program, as long as I'm aware of the possible attack vectors, I can try and guard against that. One will never be totally secure - if you are targeted for whatever reason, you will get done. The goal is simply to make you a harder target than the next person.
After all, you keeping your passwords in your head is still a point of failure if a keylogger is installed - we both become exposed to the same weakness. Your security controls that prevent your passwords from being stolen are essentially the same as mine - guarding your machine from unauthorised access to install a program. If those controls are bypassed, they get both our passwords.
Gassing Station | Computers, Gadgets & Stuff | Top of Page | What's New | My Stuff