Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Google to employees: 'Mac or Linux, but no more Windows'
TUAW ^

Posted on 05/31/2010 7:32:31 PM PDT by Gomez

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-8081-93 last
To: OneWingedShark
I think your FR posting algorithm is either an infinite loop (which you caught) or contained a linked list ...

Cheers!

81 posted on 06/01/2010 3:55:07 PM PDT by grey_whiskers (The opinions are solely those of the author and are subject to change without notice.)
[ Post Reply | Private Reply | To 68 | View Replies]

To: NVDave
Again, noting I don't have much tech background, IIRC, part of the problem with Postscript was that Adobe wanted to keep it proprietary and charge a hefty fee for each installation. I definitely remember Postscript fonts costing upwards of $100 per font set. You also had to get a Postscript printer to print documents, and they were significantly more expensive than regular printers.

I think this was why Postscript ran out of gas, rather than because of technical issues getting it to function as a wysiwyg monitor driver. I don't doubt that there were some speed issues, though.

82 posted on 06/01/2010 4:00:35 PM PDT by Richard Kimball (We're all criminals. They just haven't figured out what some of us have done yet.)
[ Post Reply | Private Reply | To 69 | View Replies]

To: SmokingJoe
[*BUZZZZZZ*]
Sorry, play again. Granted, it's a nasty trick. But it's not self-replicating:
[the spyware] is downloaded and installed on users’ computers via the installation process for unrelated applications...
That's just a piggybacked piece of malware; those have been around for a long time. Does it travel by itself and infect a new machine without operator intervention? Apparently, no. So it's not a true virus, it's just a nasty trick.

Same Old Stuff, needs a human operator to do anything. By longstanding agreement, the battle to produce an OS-X virus requires that it be self-replicating, like the ones that plague Windows. If your candidate requires the action of an operator, it's not self-replicating.

"HI, Computer User! Please execute these commands now:
  cd /
  rm -rf *

Thank you!!"
Still waiting for a self-replicating OS-X virus...
83 posted on 06/01/2010 4:23:42 PM PDT by dayglored (Listen, strange women lying in ponds distributing swords is no basis for a system of government!)
[ Post Reply | Private Reply | To 75 | View Replies]

To: Swordmaker
...precipitated in large part by the security breach attributed to Chinese hackers; Google's IT leaders apparently feel that Microsoft's OS represents too great a risk across the enterprise to leave it in place.
By this time next year, netbooks will be sold at Family Dollar/Dollar General type stores. :')
84 posted on 06/01/2010 4:25:24 PM PDT by SunkenCiv ("Fools learn from experience. I prefer to learn from the experience of others." -- Otto von Bismarck)
[ Post Reply | Private Reply | To 28 | View Replies]

To: dayglored
That's just a piggybacked piece of malware; those have been around for a long time

Most Windows spyware/malware get installed in the same fashion, or through some kind of trickery or the other, like some file with a deceptive name which users click on to install some spyware or malware.
I am not going to split hairs on how the sypyware or malware is installed. If we did that, we'd exclude most Windows malware too.
You asked for an example of malware on Mac OS. You got it pretty darn quick too. No excuses.
So sorry.

85 posted on 06/01/2010 4:32:57 PM PDT by SmokingJoe
[ Post Reply | Private Reply | To 83 | View Replies]

To: SunkenCiv
...precipitated in large part by the security breach attributed to Chinese hackers; Google’s IT leaders apparently feel that Microsoft's OS represents too great a risk across the enterprise to leave it in place.

As I understand it, those Google computers that got breached were using the outdated, much less secure IE6, which Microsoft has been begging users to migrate from for years.

http://www.computerweekly.com/Articles/2010/01/15/239973/mcafee-fingers-internet-explorer-in-google-china-hack.htm
Not to mention, outfits from big banks to NASA to insurance companies have had their servers hacked, and they were not using Windows either.

86 posted on 06/01/2010 4:42:31 PM PDT by SmokingJoe
[ Post Reply | Private Reply | To 84 | View Replies]

To: grey_whiskers

Several:
1) Scheme, which I’d like to get to know a bit better {had about two weeks on it in a programming languages course; the Huffman idea actually started as a extra credit option for an Algorithms class.}

2) Delphi, I got it 85% working with a nice dictionary object I made, a passable message object (which was either a single message or a group of them), and a couple of algorithms for manipulating messages and lists. (IE on a list of these message objects, sorted by the number of instances that it appeared, ‘eat’ the N least messages to produce a new message to be inserted into the list.)

3) Ada, using the Ada.Containers.Maps generics I basically did the same operation as #2; it helped me both with better understanding Ada’s I/O, Ada’s Generics, and the strong interface/implementation separation as it was the first non-trivial program that I’d written in Ada. {I also broke it after getting it working with a “brilliant idea” that didn’t work... so now I have a non-working Huffman en-/de-coder to show for it. LOL}


87 posted on 06/01/2010 5:34:49 PM PDT by OneWingedShark (Q: Why am I here? A: To do Justly, to love mercy, and to walk humbly with my God.)
[ Post Reply | Private Reply | To 79 | View Replies]

To: SmokingJoe
>> That's just a piggybacked piece of malware; those have been around for a long time

> Most Windows spyware/malware get installed in the same fashion, or through some kind of trickery or the other, like some file with a deceptive name which users click on to install some spyware or malware. I am not going to split hairs on how the sypyware or malware is installed. If we did that, we'd exclude most Windows malware too. You asked for an example of malware on Mac OS. You got it pretty darn quick too. No excuses. So sorry.

That's sorry, alright.

I asked for an example of self-replicating malware for OS-X.

I'm not interested in discussing malware that requires a user to make a stupid decision, or which piggybacks on other legit code. Sure, those are vectors. But they have NOTHING to do with the robustness of the operating system against automated attack, which is the topic of our conversation.

Of course, as you say, "If we did that, we'd exclude most Windows malware too." True. But the point is, there's still a lot of Windows malware that IS self-replicating, and those are the ones that are most dangerous, most feared, and most valuable to the virus writers because they can be invisible.

Joe, you know your response contained its own indictment -- the word "most", meaning "not all". I don't need to rub it in.

88 posted on 06/01/2010 6:02:02 PM PDT by dayglored (Listen, strange women lying in ponds distributing swords is no basis for a system of government!)
[ Post Reply | Private Reply | To 85 | View Replies]

To: dayglored
I'm not interested in discussing malware that requires a user to make a stupid decision, or which piggybacks on other legit code

That's exactly how most Windows malware get installed.
I am VERY interested in that, and so should you. You leave that out, and there is nothing much to discuss.
I am not interested in nitpicking and excluding the most common methods by which malware gets installed.
Bottom line, the Apple Mac OSX HAS been infected by malware. That's all that counts.

89 posted on 06/01/2010 6:07:18 PM PDT by SmokingJoe
[ Post Reply | Private Reply | To 88 | View Replies]

To: dayglored

Ok, how about C/C++?
Can we consider that a virus? (Dictionary.com, Def 3: “a corrupting influence on morals or the intellect; poison.”) And considering that it vectors in on ALL Unix/Linux systems this means that it’s also in Mac’s OSX...


90 posted on 06/01/2010 6:08:46 PM PDT by OneWingedShark (Q: Why am I here? A: To do Justly, to love mercy, and to walk humbly with my God.)
[ Post Reply | Private Reply | To 88 | View Replies]

To: SmokingJoe
>> I'm not interested in discussing malware that requires a user to make a stupid decision, or which piggybacks on other legit code

> That's exactly how most Windows malware get installed. I am VERY interested in that, and so should you. You leave that out, and there is nothing much to discuss.

No, Joe, you leave that COMMON CRAP malware out, and what's left is the stuff of interest to this conversation -- the differences.

> I am not interested in nitpicking and excluding the most common methods by which malware gets installed. Bottom line, the Apple Mac OSX HAS been infected by malware.

And if I throw a Mac on the concrete floor it breaks, just like if I throw a Windows PC on the same floor. That is not a difference. I was trying to point out a DIFFERENCE having to do with automated attacks.

> That's all that counts.

No, it doesn't count in this conversation at all. You're having a different conversation, with yourself. Enjoy.

91 posted on 06/01/2010 6:28:37 PM PDT by dayglored (Listen, strange women lying in ponds distributing swords is no basis for a system of government!)
[ Post Reply | Private Reply | To 89 | View Replies]

To: OneWingedShark
> Ok, how about C/C++? Can we consider that a virus? (Dictionary.com, Def 3: “a corrupting influence on morals or the intellect; poison.”) And considering that it vectors in on ALL Unix/Linux systems this means that it’s also in Mac’s OSX...

Now THAT is an entertaining question! :)

Only problem is that, unless you've written a self-replicating code generator/compiler/distributor, you still need a human being (programmer) to advance the C/C++ virus to infect another machine. So it doesn't fit the bill: "...a successful self-replicating virus..."

But I grant you that it's an interesting thought.... I wonder if it's possible, or for that matter, if it's been demonstrated? Maybe somebody in robotics or AI has an example...?

92 posted on 06/01/2010 6:33:47 PM PDT by dayglored (Listen, strange women lying in ponds distributing swords is no basis for a system of government!)
[ Post Reply | Private Reply | To 90 | View Replies]

To: Richard Kimball

You’re right — there was a hefty licensing fee. Adobe started to see the light on this issue — too late, IMO, but they finally did start to come around.


93 posted on 06/02/2010 9:25:22 AM PDT by NVDave
[ Post Reply | Private Reply | To 82 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-8081-93 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson