Forum overlords delete developer gripes
Apple faces yet more flack from the Mac faithful over the discovery that the operating system won’t run the latest version of Java. It’s one of several beefs relating to the OS X upgrade that is sparking vitriol among the normally docile crowd.
Leopard may have 300 new features, but it is unable to run Java 1.6, even though that same version is available for both Windows and Linux. That has taken some Mac users by surprise, including some on this user forum on Apple’s website. Several users there say 1.6 is so central to the development work they do on a daily basis that they will be forced to use an OS other than Leopard if it remains incompatible.
“This is a show stopper for me, and I will have to revert to 10.4, since my job as a software engineer for Sun requires Java 6–this will likely prevent a lot of people from upgrading, and there’s a well represented Mac userbase at Sun,” a user going by the name buckmelter wrote. 10.4 is a reference to Tiger, the OS X predecessor to Leopard.
The world’s largest hard disk manufacturer will offer customers 5% cash back on disk drives bought over the last six years in order to settle a legal action over the measurement of hard drive capacity.
But the real story starts way back, when marketers decided 24 bytes didn’t mean much. In modern terms, it’s equivalent to a fraction of a cent, or the weight of a feather atop a two tonne truck.
Story at http://apcmag.com/7449/seagate_offers_cash_to_customers_for_missing_megabytes via CoU.
You can file your claim at http://www.harddrive-settlement.com/
This is not new since this is ‘common’ issue with redirection and being use by spammer but geez, can’t this company do something to stop the redirection to succeed?
Same SPAM emails received today:
That’s AOL, Yahoo and Google. Guys, you should do something to kill this “False redirection” and it will sure help in killing one method of spammers is using.
I know we can disable the automatic redirection in the browser but that will kill the features that many are using. Example:
1. Search function in the browser
2. Downloading a file that is redirected by good site will not be serve automatically unless a user will click the link to proceed with the download
3. Viewing a page that is redirected by good site e.g. http://www.microsoft.com/technet/security/bulletin/ms07-oct.mspx, if you will click on any bulletin title and if the redirection is disable, you won’t see the http://www.microsoft.com/technet/security/bulletin/ms07-055.mspx unless you will click again to proceed to the bulletin. That’s because Microsoft also use redirection: http://go.microsoft.com/fwlink/?LinkId=94668
4. Using any services that take advantage of redirection e.g. shorturl services, forum software with redirection feature etc.
The advise to delete spam emails from the server and/or view the email in plain text are of course the first thins to remember but we KNOW that many DO NOT do that. That’s why there are many victims of phishing and pharming, scam etc. If the developers at Google, AOL and Yahoo and other search engines will kill the “false redirection” then many’s butt will be save .. that’s for sure!
Microsoft has been slapped with a lawsuit filed by Korean instant messaging program developer Digito.com, which is claiming millions of dollars in anti-trust damages.
According to Korean newspaper Chosun, the US software mammoth has been accused of causing a loss in sales revenue estimated at W30bn (US$1=W918) because the firm’s Windows operating system comes pre-loaded with a media player and instant messaging.
Seoul Central District Court confirmed yesterday that Digito was suing Microsoft in the US and Korea, claiming that the software giant had violated the Fair Trade Act since 2000.
Korea’s first instant messenger was created by Digito in 1998 under the moniker Soft Messenger.
From Slashdot http://slashdot.org/article.pl?sid=06/12/16/2252240 :
FrankNFurter writes to note the launch yesterday of the FSF’s BadVista campaign against Microsoft’s new operating system. BadVista’s aim is to inform users about the alleged harms inflicted by Vista on the user and about free software alternatives. Quoting program administrator John Sullivan:
“Vista is an upsell masquerading as an upgrade. It is an overall regression when you look at the most important aspect of owning and using a computer: your control over what it does. Obviously MS Windows is already proprietary and very restrictive, and well worth rejecting. But the new ‘features’ in Vista are a Trojan Horse to smuggle in even more restrictions. We’ll be focusing attention on detailing how they work, how to resist them, and why people should care.”
Berkeley Data Systems, creators of Mozy online backup, today announced the release of Mozy Unlimited Backup. For $4.95 a month, users may now backup unlimited amounts of data and have access to an unlimited number of restores. Users may choose month-to-month or annual plans, and Mozy will continue to offer consumers 2 GB of automatic online backup for free.
This guide provides security management information about the threats posed by social engineering and the defenses that are available to help resist social engineering hackers.
Spymac http://www.spymac.com, the largest Macintosh community and top Macintosh site for sharing photos, movies and music online, announced today “Move It,” the ultimate resource for consumers interested in switching from Windows to Macintosh. The new Spymac online service at http://spymac.com/moveit, lets users ask, learn, blog and connect with other Spymac users to help them through the whole Mac switching process.
For those who wish to enhance or fortify the security of the MySQL installation the following technical 10 steps are a good start.
Step 1: Run MySQL in a chroot jail
Step 2: Restrict or disable remote access
Step 3: Change default root password and change root username
Step 4: Remove anonymous accounts and accounts with empty passwords
Step 5: Remove sample database
Step 6: Run MySQL as an unprivileged user
Step 7: Grant minimum privileges for database users
Step 8: Enable MySQL logging and restrict access to logs
Step 9: Encrypt data stored in the database using MySQL built-in functions
Step 10: Keep a look out for patches
Details at http://www.net-security.org/secworld.php?id=4135