
ulbador
Apr 26, 08:43 PM
The OP is shockingly confused. When it says that you can't reuse an invalidated NSTimer, that just means you have to create a new instance. You can reuse that pointer as much as you want once you invalidate and release it.

montycat
Mar 24, 07:18 PM
This would NEVER Happen. but wouldn't it be an awesome treat if Apple added in an emulator that could run (and was pre loaded with) each major version of Apple OS's from the Apple I on. ! (and heck while we're dreaming, how about all the Next Step OS versions too)
It's in no way practical, but I'd truly geek out over it ! :)
Agreed! I was playing around with OS 9 the other night and it was fun and nostalgic :)
It's in no way practical, but I'd truly geek out over it ! :)
Agreed! I was playing around with OS 9 the other night and it was fun and nostalgic :)

darkwing
Apr 4, 08:21 AM
I bought the 360 on launch day back in 2005 with cash. Camped out at Wal-Mart for 18 hours for it too. Again, didn't do this so some idiot could steal it :(
I suggest you buy a PS3 instead. With their sales numbers, it's obvious nobody wants one! Therefore, nobody will steal it!
(The PS3 is my favorite console, as everyone knows. I'm just making a joke. No need to move this post to console war. :P)
I suggest you buy a PS3 instead. With their sales numbers, it's obvious nobody wants one! Therefore, nobody will steal it!
(The PS3 is my favorite console, as everyone knows. I'm just making a joke. No need to move this post to console war. :P)

Applejuiced
Apr 22, 01:11 PM
On IE7 whenever I click either the "up" or "down" arrow I get taken back to the forum index.
Same here.
It was working fine yesterday but today it just takes me to the forum index.
I got IE9 installed btw.
Same here.
It was working fine yesterday but today it just takes me to the forum index.
I got IE9 installed btw.
more...

lordonuthin
Apr 27, 09:34 PM
heck, you know there's a motherboard out there that can hold 2 x i7 980x for $600 i think. now that would be awesome - but just 2 processors and motherboard would cost over $2600
I thought about that, getting one cpu now and getting another one down the road, but the board was only $200 (http://www.newegg.com/Product/Product.aspx?Item=N82E16813128423) in this case maybe 2 systems would be better than one - if I get another one down the road or if Apple EVER gets around to making a new Mac Pro :rolleyes:
I thought about that, getting one cpu now and getting another one down the road, but the board was only $200 (http://www.newegg.com/Product/Product.aspx?Item=N82E16813128423) in this case maybe 2 systems would be better than one - if I get another one down the road or if Apple EVER gets around to making a new Mac Pro :rolleyes:

iMeowbot
Oct 28, 05:44 PM
Isn't a healthy chunk of OS X based on FreeBSD?
Yes, big parts of it come from the BSD world.
A free, open source Unix distro? In a sense, if they use FreeBSD and do not contribute back to the very open source community they're borrowing from, doesn't that make Apple a thief?
The BSD terms specifically allow derivatives to keep their sources closed, as long as credit is given.
Yes, big parts of it come from the BSD world.
A free, open source Unix distro? In a sense, if they use FreeBSD and do not contribute back to the very open source community they're borrowing from, doesn't that make Apple a thief?
The BSD terms specifically allow derivatives to keep their sources closed, as long as credit is given.
more...

PghLondon
Apr 29, 02:34 PM
And people kept telling me that OSX and iOS weren't going to merge in any meaningful manner for years ahead, if ever. Yeah right. I'd bet the one after this has them nearly fully merged and I mean towards iOS for the most part. OSX will be dumbed down to the lowest common brain cell and you won't be able to get free/open software anymore. It'll have to come through the App Store or not at all. Wait and see. That is the point I'll be moving on.
That's impressive. You've shown you don't understand business, software engineering, or computer engineering, all in one paragraph.
Nice!
That's impressive. You've shown you don't understand business, software engineering, or computer engineering, all in one paragraph.
Nice!

Aperture
Jan 8, 09:35 PM
Just to up the neurosis of this spoiler free page, I wonder if any leaks could be given on our visions periphery by the advertising?
Thought of this.. but you shouldn't see a change in advertising within maybe 24 hours. Could be wrong but just a good guess.
Thought of this.. but you shouldn't see a change in advertising within maybe 24 hours. Could be wrong but just a good guess.
more...

Mitthrawnuruodo
Sep 12, 07:34 AM
Even the Norwegian iTunes store is down...
I didn't expect that, after the last couple of months controversies here... :confused:
I didn't expect that, after the last couple of months controversies here... :confused:

TwinCities Dan
Apr 6, 01:16 PM
Our newest addition to our saltwater tank :cool:
Benny the Scooter Blenny. :p
279918279919
Benny the Scooter Blenny. :p
279918279919
more...

ten-oak-druid
Apr 17, 11:25 AM
First off, Apple does not have the time or ways to check for security risks. They don't have the source code, and we've already seen apps with banned talents appear. Moreover, security research shows that many iOS apps can access personal information (and many do send that off to remote servers without Apple making a peep).
As for approvals, apps that "duplicate" Apple functionality are banned. That alone means a lot of cool stuff is not available from their store.
You also cannot write a homebrew app for your friends and give it to them to use, unless you want to pay $100 a year to keep a dev license going. That's another reason why there's so much crud in the app store.
Unfortunately, we've also seen apps approved that should never have been, such as the baby shaker one.
Don't confuse approval control with a guarantee of either security or quality.
And once an app that gets by with security risk is found, it is removed. Compare this to getting an app off of site X. Does site X remove the app because it was found to be a security risk? And should an appear turn out to be stealing information, which is easier to trace to the source, one that went through the app store registration process with apple or on on site X residing somewhere in Russia?
You're narrowly defining the methods of security that Apple's app store can provide.
As for approvals, apps that "duplicate" Apple functionality are banned. That alone means a lot of cool stuff is not available from their store.
You also cannot write a homebrew app for your friends and give it to them to use, unless you want to pay $100 a year to keep a dev license going. That's another reason why there's so much crud in the app store.
Unfortunately, we've also seen apps approved that should never have been, such as the baby shaker one.
Don't confuse approval control with a guarantee of either security or quality.
And once an app that gets by with security risk is found, it is removed. Compare this to getting an app off of site X. Does site X remove the app because it was found to be a security risk? And should an appear turn out to be stealing information, which is easier to trace to the source, one that went through the app store registration process with apple or on on site X residing somewhere in Russia?
You're narrowly defining the methods of security that Apple's app store can provide.

dethmaShine
Apr 11, 06:53 PM
Anyone who says that is taking the mickey. As a mac user of over a decade I can say I'm quite happy that I can run Windows 7 on my mac.
People on both sides of the OS war (or the console war, or Pepsi/Coke war, or the Marvel/DC war, etc.) are either trolls or severely lacking in the "life" department.
+1 I'd say.
Use winXP everyday; more than my mac.
Use win7 for beta-testing apps in the office.
Great OS's; I just wish MS do something in the usability department. Or may be I'm using it wrong.
People on both sides of the OS war (or the console war, or Pepsi/Coke war, or the Marvel/DC war, etc.) are either trolls or severely lacking in the "life" department.
+1 I'd say.
Use winXP everyday; more than my mac.
Use win7 for beta-testing apps in the office.
Great OS's; I just wish MS do something in the usability department. Or may be I'm using it wrong.
more...

hobo.hopkins
May 2, 09:33 AM
I should hope that this update will allay any of the concerns and fears that some panic-stricken people have had lately.

TimUSCA
Apr 25, 12:08 PM
Looks legit to me other than that last one... which looks 110% fake.
more...

Popeye206
Mar 29, 05:13 AM
Game developers. World of Warcraft. Adobe. Microsoft. All of these developers not only do not distribute on the App Store but can not due to the App Store's TOS. I like the App Store but the control/terms keep a lot of great programs (like World of Warcraft, which one the Apple Design Award multiple times I think) out.
What???? 30% is too much for them? Or is there something else in the terms that drive them away?
My friend... I use to work for Adobe and it's not the 30% margin keeping them away. 30% is normal for distribution.
What???? 30% is too much for them? Or is there something else in the terms that drive them away?
My friend... I use to work for Adobe and it's not the 30% margin keeping them away. 30% is normal for distribution.

rdowns
Apr 23, 01:15 PM
The rating system looks ugly and out of place and just adds clutter to the forums.
Much like the logo in your avatar. :p
Much like the logo in your avatar. :p
more...

JohnnyQuest
Mar 17, 10:36 AM
MacRumours also known as the moral police! lmao Cracks me up especially after all the post I have read in the past about people receiving extra computers in the mail by accident from apple!!! And if I was a troll and made this whole thing up completely, I have succeeded for sure, for laughing at all of the post in this stupid thread it has ruffled some nerves of the people at home wishing they had an Ipad, insted of posting from their Acer Netbook. This place is a joke
How dull are you? Yep, I'm sure most people here are just typing away on their Dell's!
Delusional much? You actually think you're better in some way for this whole scheme. Wow.
PS- typed on my iPad :rolleyes:
How dull are you? Yep, I'm sure most people here are just typing away on their Dell's!
Delusional much? You actually think you're better in some way for this whole scheme. Wow.
PS- typed on my iPad :rolleyes:

schwell
Oct 8, 09:52 PM
You can't get email or surf the web while talking on a Verizon 3G phone. You can on AT&T and T-Mobile.
AT&T should show an empty map for where you can have both on Verizon.
AT&T should show an empty map for where you can have both on Verizon.

flir67
Nov 24, 03:53 PM
just got the macbook with nextday shipping, not bad. 101.00 off
can't beat it if you want it quick.
wish they did the discount to the refurbished units, but you can't win them all.
I can't believe they charge tax on shipping, thats just wrong... shipping should be flat fee after tax........
can't beat it if you want it quick.
wish they did the discount to the refurbished units, but you can't win them all.
I can't believe they charge tax on shipping, thats just wrong... shipping should be flat fee after tax........
John Purple
Jan 15, 02:00 PM
Not one MacBook with Penryn (SSE4)
Not one model with Blue-Ray
MBP old old old
Aperture same as MBP
Is MBA revolutionary? I don't know.
Just sold my Apple shares.
Not one model with Blue-Ray
MBP old old old
Aperture same as MBP
Is MBA revolutionary? I don't know.
Just sold my Apple shares.
Ino
Oct 10, 07:28 PM
The virtual scroll wheel interface would pretty much wreck the games that were just released for the 5/5.5G iPods...
...unless the game itself occupies only half the screen and the other half is just the click wheel on some sort of background, whether in portrait or landscape. I'm a little skeptical on how that kind of user experience might be though...
...unless the game itself occupies only half the screen and the other half is just the click wheel on some sort of background, whether in portrait or landscape. I'm a little skeptical on how that kind of user experience might be though...
Mr_Brightside_@
Apr 11, 07:38 AM
Excellent sig. ;)
Shoulda seen the last one
Shoulda seen the last one
demallien
Oct 9, 03:34 AM
Finding where the keys are on your HDD is the easy part, accessing and using them is the task that takes months... [Simple way to find the location of the keys. Image your HDD. Purchase file from iTunes. Image your HDD compare the two images. The new key(s) (and the file itself) must be in the bits that changed.]
Sure. Of course, the guys working on DRM at Apple aren't idiots. If you were an engineer charged with defeating this type of attack, what would you do? I can tell you what I would do, I would start changing a whole load of bits on your harddrive, not because it's necessary, but because it makes it that much harder for you to find the stuff that changed.
It's a moot point anyway. Any file that you download from iTunes is going to be at least a few megs in size. The key is going to be somewhere in the order of a couple of hundred bytes. Which bytes amongst the several megs are the key? They aren't necessarily contiguous, they're almost certainly encrypted by another key hidden elsewhere in the system, and they may even be fiddled by a virtual machine after decryption, just to muddle things up a little bit more.
Finding the approximate location on the HD is simple. Fiding the actual key in the right order is an extremely difficult task.
As someone who does this for a living, can you comment on my read of the hacks that have been released in the later post http://forums.macrumors.com/showpost.php?p=2917258&postcount=96. It still seems to me that where DRM has been hacked has relied on key retrieval or finding the weak spot in the chain.
B
Um, of course DRM hacks rely on either retrieving the key, or finding the weak link. They are the only two attacks possible - grab the data after the program has decrypted it for use, or find the key/algorithm so that you can do the decryption yourself. At the moment the first attack is nearly trivial to implement, although that will change a bit when the manufacturers start moving on to a "Trusted Computing" style platform. All you need to do is write your own audio driver that sits between the computer and the real driver. It picks of the data and stores it as it's sent to the speakers.
The second solution is much more difficult, but far more elegant. It allows you to keep intact all of the metadata associated with the file (track name, lyrics, album name etc etc). BUT, you have to be clever enough to recover the key.
Sure. Of course, the guys working on DRM at Apple aren't idiots. If you were an engineer charged with defeating this type of attack, what would you do? I can tell you what I would do, I would start changing a whole load of bits on your harddrive, not because it's necessary, but because it makes it that much harder for you to find the stuff that changed.
It's a moot point anyway. Any file that you download from iTunes is going to be at least a few megs in size. The key is going to be somewhere in the order of a couple of hundred bytes. Which bytes amongst the several megs are the key? They aren't necessarily contiguous, they're almost certainly encrypted by another key hidden elsewhere in the system, and they may even be fiddled by a virtual machine after decryption, just to muddle things up a little bit more.
Finding the approximate location on the HD is simple. Fiding the actual key in the right order is an extremely difficult task.
As someone who does this for a living, can you comment on my read of the hacks that have been released in the later post http://forums.macrumors.com/showpost.php?p=2917258&postcount=96. It still seems to me that where DRM has been hacked has relied on key retrieval or finding the weak spot in the chain.
B
Um, of course DRM hacks rely on either retrieving the key, or finding the weak link. They are the only two attacks possible - grab the data after the program has decrypted it for use, or find the key/algorithm so that you can do the decryption yourself. At the moment the first attack is nearly trivial to implement, although that will change a bit when the manufacturers start moving on to a "Trusted Computing" style platform. All you need to do is write your own audio driver that sits between the computer and the real driver. It picks of the data and stores it as it's sent to the speakers.
The second solution is much more difficult, but far more elegant. It allows you to keep intact all of the metadata associated with the file (track name, lyrics, album name etc etc). BUT, you have to be clever enough to recover the key.
rdowns
Apr 22, 07:02 AM
All seems rather silly to me.
Over the years, there must have been 85 threads on some type of reputation/like/thanks system and it's always been shot down (thankfully). What changed?
Over the years, there must have been 85 threads on some type of reputation/like/thanks system and it's always been shot down (thankfully). What changed?
0 comments:
Post a Comment