Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

To: Swordmaker
Why would that be? The problem would only exist if the user had installed and run the trojan program

Ok, I guess that exploit was too complicated for simple Mac folks to understand. Let me make it so that even a Macaholic can understand. Forgive me for assuming you understood, you know what happens when one assumes? And for that I apologize.

Here it is in pretty simple terms. 1) Grandma turns on Mac. 2) Grandma is smart enough to update to the latest updates so she updates via Mac's built in software update service 3) Hacker attacks her update and replaces the official Apple update with any application he wants. 4) Grandma didn't "install a trojan" she installed an approved update from Apple

As far as name changing...making my name shorter is worse than changing yours...unless you're too dim to understand what my name stands for. And once again I must apologize because I should have realized based on your incoherant posts and circular logic that you couldn't translate it. Try saying my screen name outloud to somone and they will explain to you what you just said.

I believe this horse has been beat enough. You won't open your eyes no matter what evidence is provided. And when proven wrong you just ignore your previous posts and put them out of order to fit your twisted/circular logic.

224 posted on 08/25/2005 12:01:51 PM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 217 | View Replies ]


To: for-q-clinton
Here it is in pretty simple terms. 1) Grandma turns on Mac. 2) Grandma is smart enough to update to the latest updates so she updates via Mac's built in software update service 3) Hacker attacks her update and replaces the official Apple update with any application he wants. 4) Grandma didn't "install a trojan" she installed an approved update from Apple

How does he do that? To do what you claim, the hacker has to have complete physical ROOT access to her computer. ROOT is turned off in OSX... a user has to first activate it then provide a separate password. Grandma is not operating in ROOT. That is the point. If he has that, your virus scenario is superfluous.

To be a "virus" it must be able to install itself without user interaction.

232 posted on 08/25/2005 12:48:12 PM PDT by Swordmaker (Beware of Geeks bearing GIFs.)
[ Post Reply | Private Reply | To 224 | View Replies ]

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson