MacRumors
May 2, 08:49 AM
http://www.macrumors.com/images/macrumorsthreadlogo.gif (http://www.macrumors.com/2011/05/02/new-macdefender-malware-threat-for-mac-os-x/)
http://images.macrumors.com/article/2011/05/02/094840-macdefender.jpg
Antivirus firm Intego today noted (http://blog.intego.com/2011/05/02/macdefender-rogue-anti-malware-program-attacks-macs-via-seo-poisoning/) the discovery of new malware known as "MACDefender" targeting Mac OS X users via Safari. According to the report, the malware appears to be being deployed via JavaScript as a compressed ZIP file reached through Google searches.When a user clicks on a link after performing a search on a search engine such as Google, this takes them to a web site whose page contains JavaScript that automatically downloads a file. In this case, the file downloaded is a compressed ZIP archive, which, if a specific option in a web browser is checked (Open "safe" files after downloading in Safari, for example), will open.More information is available in Apple's support communities (1 (https://discussions.apple.com/thread/3029144), 2 (https://discussions.apple.com/thread/3029310)), where users report that the malware is popping up directly in Google image searches.
Users running administrator accounts and with the Safari option to open "safe" files automatically checked appear to be most at risk, with some claiming that no notification of installation was seen or password required. Only when a screen popped up asking for a credit card number to sign up for virus protection did they realize that malware had been installed on their systems.
For those infected with the MACDefender malware, the following steps are recommended:
1. Open Applications > Utilities > Activity Monitor and quit any processes linked to MACDefender.
2. Delete MACDefender from the Applications folder.
3. Check System Preferences > Accounts > Login Items for suspicious entries
4. Run a Spotlight search for "MACDefender" to check for any associated files that might still be lingering.
Full details on the malware and the simplest steps needed for its complete removal are still being investigated.
Users are of course reminded that day-to-day system usage with standard accounts rather than administrator ones, as well as unchecking the Safari option for automatically opening "safe" files, are two of the simplest ways users can enhance their online security, adding extra layers of confirmation and passwords in the way of anything being installed on their systems.
Article Link: New 'MACDefender' Malware Threat for Mac OS X (http://www.macrumors.com/2011/05/02/new-macdefender-malware-threat-for-mac-os-x/)
http://images.macrumors.com/article/2011/05/02/094840-macdefender.jpg
Antivirus firm Intego today noted (http://blog.intego.com/2011/05/02/macdefender-rogue-anti-malware-program-attacks-macs-via-seo-poisoning/) the discovery of new malware known as "MACDefender" targeting Mac OS X users via Safari. According to the report, the malware appears to be being deployed via JavaScript as a compressed ZIP file reached through Google searches.When a user clicks on a link after performing a search on a search engine such as Google, this takes them to a web site whose page contains JavaScript that automatically downloads a file. In this case, the file downloaded is a compressed ZIP archive, which, if a specific option in a web browser is checked (Open "safe" files after downloading in Safari, for example), will open.More information is available in Apple's support communities (1 (https://discussions.apple.com/thread/3029144), 2 (https://discussions.apple.com/thread/3029310)), where users report that the malware is popping up directly in Google image searches.
Users running administrator accounts and with the Safari option to open "safe" files automatically checked appear to be most at risk, with some claiming that no notification of installation was seen or password required. Only when a screen popped up asking for a credit card number to sign up for virus protection did they realize that malware had been installed on their systems.
For those infected with the MACDefender malware, the following steps are recommended:
1. Open Applications > Utilities > Activity Monitor and quit any processes linked to MACDefender.
2. Delete MACDefender from the Applications folder.
3. Check System Preferences > Accounts > Login Items for suspicious entries
4. Run a Spotlight search for "MACDefender" to check for any associated files that might still be lingering.
Full details on the malware and the simplest steps needed for its complete removal are still being investigated.
Users are of course reminded that day-to-day system usage with standard accounts rather than administrator ones, as well as unchecking the Safari option for automatically opening "safe" files, are two of the simplest ways users can enhance their online security, adding extra layers of confirmation and passwords in the way of anything being installed on their systems.
Article Link: New 'MACDefender' Malware Threat for Mac OS X (http://www.macrumors.com/2011/05/02/new-macdefender-malware-threat-for-mac-os-x/)
fatphone4
Jun 27, 10:50 AM
I was on sprint for 10 years, dropped 6 to 7 calls a day. I switched one of my 8 phones into AT&T (iphone) to test it out. I did not drop a single call for 3 weeks. So I cancelled all my sprint lines and switched to AT&T, been on AT&T for 8 months maybe 6 dropped calls since. Much better service IMO
Rt&Dzine
Apr 23, 06:17 PM
Have we answered the question of why there are so many atheists here? We got sidetracked by a few people making generalizations about atheists but not adding much substance.
CQd44
May 2, 08:56 AM
"Huge" threat.
About as huge as most windows ones!
About as huge as most windows ones!
Sydde
Mar 14, 12:56 PM
Silly boy, the Earth's magma would swallow that 'little' pill with no problem.
And gravity has yet to go up. :p LOL
So who was it posting the map?
And gravity has yet to go up. :p LOL
So who was it posting the map?
MH01
Apr 21, 04:11 AM
So you are insulting all Apple users as those who "don't know what you're doing with your own devices."
You must live in a alternate univerise if think that Apple users are tech savy. You average user is very happy to have Apple control thier experience, ie they are techtards. And frankly owning an Apple product is the best thing for them, with a PC etc they will just get themselves into trouble.
If your still under some illusion of how tech savy they are read through the macrumors forums...... and remeber they are the more tech savy ones!
I have moved every family member over to mac who has no idea about computer, they are happy. The people I know who work in IT, develop and are really tech savy, still have a PC (and an android, some have both android and iphone)
You must live in a alternate univerise if think that Apple users are tech savy. You average user is very happy to have Apple control thier experience, ie they are techtards. And frankly owning an Apple product is the best thing for them, with a PC etc they will just get themselves into trouble.
If your still under some illusion of how tech savy they are read through the macrumors forums...... and remeber they are the more tech savy ones!
I have moved every family member over to mac who has no idea about computer, they are happy. The people I know who work in IT, develop and are really tech savy, still have a PC (and an android, some have both android and iphone)
munkery
May 2, 08:18 PM
Problems with Windows security in comparison to Mac OS X presented just in this thread:
1) Greater number of privilege escalation vulnerabilities:
Here is a list of privilege escalation (UAC bypass) vulnerabilities just related to Stuxnet (win32k.sys) in Windows in 2011:
http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=win32k.sys+2011
Here is a list of all of the privilege escalation vulnerabilities in Mac OS X in 2011:
http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=Mac+OS+X+privileges+2011
2) Earlier versions of NT based Windows (Windows XP and earlier) do not use discretionary access controls by default.
3) Permissions system does not include a user defined unique identifier (password) by default. More susceptible to user space exploitation leading to authentication stolen via spoofed prompt that appears unrelated to UAC because password not associated with authentication.
4) Windows sandbox mechanism relies on inherited permissions so that turning off UAC turns off the sandbox. This sandbox has been defeated in the wild (in the last two pwn2owns).
I do not know of any TrustedBSD MAC framework (BSD and Mac sandbox), AppArmor (openSUSE and Ubuntu), or SE Linux (Fedora) mandatory access control escapes? These sandbox mechanisms do not rely on inherited permissions.
5) The Windows registry is a single point of failure that can be leveraged by malware.
EDIT:
If malware doesn't need to use some method to achieve privilege escalation or actively phish users for their credit card number to be profitable enough to warrant their creation, then why did the specific example of malware that started this thread rely on these methods to be profitable?
Why did it not use the methods presented by KnightWRX? Why do you not see malware that only uses user level access to upload a user's data files to achieve some effect that is profitable? I can't recall any malware that uses this method.
Is it because most users do not have valuable info stored in insecure data files? I keep that type of info in encrypted secured notes in Keychain Access or in encrypted sparse bundle disk images.
Is it because it would require too much time to data mine the files for valuable info in relation to the amount of profit gained? How many GBs of data are on your system? Even the data I keep in encrypted sparse bundle disk images wouldn't be very useful for identity theft even if it was not encrypted.
Is it because given all the variables it is more cost effective to go after achieving system level access to keystroke log passwords protected by user space security mechanisms or simply to use basic phishing scams on unknowledgeable users? Makes sense to me but maybe I am wrong.
1) Greater number of privilege escalation vulnerabilities:
Here is a list of privilege escalation (UAC bypass) vulnerabilities just related to Stuxnet (win32k.sys) in Windows in 2011:
http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=win32k.sys+2011
Here is a list of all of the privilege escalation vulnerabilities in Mac OS X in 2011:
http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=Mac+OS+X+privileges+2011
2) Earlier versions of NT based Windows (Windows XP and earlier) do not use discretionary access controls by default.
3) Permissions system does not include a user defined unique identifier (password) by default. More susceptible to user space exploitation leading to authentication stolen via spoofed prompt that appears unrelated to UAC because password not associated with authentication.
4) Windows sandbox mechanism relies on inherited permissions so that turning off UAC turns off the sandbox. This sandbox has been defeated in the wild (in the last two pwn2owns).
I do not know of any TrustedBSD MAC framework (BSD and Mac sandbox), AppArmor (openSUSE and Ubuntu), or SE Linux (Fedora) mandatory access control escapes? These sandbox mechanisms do not rely on inherited permissions.
5) The Windows registry is a single point of failure that can be leveraged by malware.
EDIT:
If malware doesn't need to use some method to achieve privilege escalation or actively phish users for their credit card number to be profitable enough to warrant their creation, then why did the specific example of malware that started this thread rely on these methods to be profitable?
Why did it not use the methods presented by KnightWRX? Why do you not see malware that only uses user level access to upload a user's data files to achieve some effect that is profitable? I can't recall any malware that uses this method.
Is it because most users do not have valuable info stored in insecure data files? I keep that type of info in encrypted secured notes in Keychain Access or in encrypted sparse bundle disk images.
Is it because it would require too much time to data mine the files for valuable info in relation to the amount of profit gained? How many GBs of data are on your system? Even the data I keep in encrypted sparse bundle disk images wouldn't be very useful for identity theft even if it was not encrypted.
Is it because given all the variables it is more cost effective to go after achieving system level access to keystroke log passwords protected by user space security mechanisms or simply to use basic phishing scams on unknowledgeable users? Makes sense to me but maybe I am wrong.
Nermal
Oct 7, 06:48 PM
I had a couple apps brick my i730 back when I was on Verizon. I ended up having to hard reset and resync all my contacts.
If you were able to reset and get it working again, then it wasn't bricked. "Bricked" means that the device now has the functionality of a brick. You cannot reset a brick, and certainly can't synch contacts with one :)
If you were able to reset and get it working again, then it wasn't bricked. "Bricked" means that the device now has the functionality of a brick. You cannot reset a brick, and certainly can't synch contacts with one :)
OllyW
Apr 28, 11:33 AM
Ahh, good catch! But that's before the iPad was even released... not sure what Al meant by his comment...
The launch of the iPad won't affect Apple's market share without the iPad included, which brings us back to Al's comment. ;)
The launch of the iPad won't affect Apple's market share without the iPad included, which brings us back to Al's comment. ;)
macmax
Oct 9, 02:35 AM
Originally posted by javajedi
Come on.. lets get real..
1) Macs don't use shared libraries? You must be using System 6. For the folks who aren't familiar with the concept of the shared library (what Microsoft calls a dynamic link library) simply put shared libs are object orientated pieces of code containing functions/methods and other objects that can be invoked upon from other code. Mac OS X being highly object orientated relies almost exclusively on shared libraries. In the modern world of software engineering we rarely find it necessary to statically build an executable. If you look back at OS 7/8/9, while not as much as 10, developers could take advantage of off the shelf code. (eg, sprockets, mp lib, etc). Also you are not accurate in saying OS X is a 25 year old archiecture.
1.5) Microsoft OS's that use versions of the Windows 2000 kernel (2000 itself and XP) just like Mach, have a hardware abstraction layer. The "DLL Hell" days (Windows ME and below) are over. This is no longer an issue with the new kernel. The fact of the matter is that my P4 2.8 machine running XP is equally as stable as my PowerBook G4 800 running Mac OS X. I have not *ONCE* had either one core dump or "blue screen". Sure programs screw up, and when they do, they die, not the OS. Both OS's are very mature.
2.) I have *literally* put my PC up against my PowerBook, and the PowerBook fails miserably. I've wrote a simple stopwatch Java application that iterate through floating point instructions, and if I my PC finished 2.5 times faster than the PowerBook. If you want more details (hell I'll even give you the code) of my app, I'll be glad to share it with the community. Playing/decoding MP3's faster on the Mac? No way in hell. Winamp uses 0-1% CPU, iTunes consumes 8-12%.
3.) You speak of flaws of the "x86 architecture" but do not provide us specifics as to why you say this. The x86 processor began in the late 70's when Intel first offered the 8086 as a CISC successor to it's 4004 line of processors. Many, many things have changed over the course of 20 years. Had they sit still (like the G4/motorola chip) intel wouldn't be selling products today, now would they? The G4 is not much more than an improved G3 series processor with vector processing instructions. Be honest (especially be honest to yourself!) if you look back and compare the G3/G4, you do see improvements, but not drastic improvements. More clock, the maxbus protocol (debatable), and more cache. One of the reasons why you see Apple adding cache like mad to it's recent products is because they are in between a rock and hard place with this Motorola chip. This is exactly the same approach AMD took with their failing processor, the K5/K6. I want you to contrast this to a P4 with an i850e chipset: Insanely high clock speeds, a 533mhz bus, fast memory with RIMMs @ 4.2GB/s, with a next stop of 9.6GB/s -- to MaxBus. You will soon see why the current generation of PowerPC processors is "inferior", dare I say it.
For the most part I think its fare to say that the current Macintosh hardware performance is �status-quo�. The current best of breed of Macintoshes are slower than the current best of bread PCs. Mac�s are slower - just accept it. I don�t like it any more than you do.
my pc with xp pro ed did crash a few times and it does.
on the other hand , my macs with os x do not
Come on.. lets get real..
1) Macs don't use shared libraries? You must be using System 6. For the folks who aren't familiar with the concept of the shared library (what Microsoft calls a dynamic link library) simply put shared libs are object orientated pieces of code containing functions/methods and other objects that can be invoked upon from other code. Mac OS X being highly object orientated relies almost exclusively on shared libraries. In the modern world of software engineering we rarely find it necessary to statically build an executable. If you look back at OS 7/8/9, while not as much as 10, developers could take advantage of off the shelf code. (eg, sprockets, mp lib, etc). Also you are not accurate in saying OS X is a 25 year old archiecture.
1.5) Microsoft OS's that use versions of the Windows 2000 kernel (2000 itself and XP) just like Mach, have a hardware abstraction layer. The "DLL Hell" days (Windows ME and below) are over. This is no longer an issue with the new kernel. The fact of the matter is that my P4 2.8 machine running XP is equally as stable as my PowerBook G4 800 running Mac OS X. I have not *ONCE* had either one core dump or "blue screen". Sure programs screw up, and when they do, they die, not the OS. Both OS's are very mature.
2.) I have *literally* put my PC up against my PowerBook, and the PowerBook fails miserably. I've wrote a simple stopwatch Java application that iterate through floating point instructions, and if I my PC finished 2.5 times faster than the PowerBook. If you want more details (hell I'll even give you the code) of my app, I'll be glad to share it with the community. Playing/decoding MP3's faster on the Mac? No way in hell. Winamp uses 0-1% CPU, iTunes consumes 8-12%.
3.) You speak of flaws of the "x86 architecture" but do not provide us specifics as to why you say this. The x86 processor began in the late 70's when Intel first offered the 8086 as a CISC successor to it's 4004 line of processors. Many, many things have changed over the course of 20 years. Had they sit still (like the G4/motorola chip) intel wouldn't be selling products today, now would they? The G4 is not much more than an improved G3 series processor with vector processing instructions. Be honest (especially be honest to yourself!) if you look back and compare the G3/G4, you do see improvements, but not drastic improvements. More clock, the maxbus protocol (debatable), and more cache. One of the reasons why you see Apple adding cache like mad to it's recent products is because they are in between a rock and hard place with this Motorola chip. This is exactly the same approach AMD took with their failing processor, the K5/K6. I want you to contrast this to a P4 with an i850e chipset: Insanely high clock speeds, a 533mhz bus, fast memory with RIMMs @ 4.2GB/s, with a next stop of 9.6GB/s -- to MaxBus. You will soon see why the current generation of PowerPC processors is "inferior", dare I say it.
For the most part I think its fare to say that the current Macintosh hardware performance is �status-quo�. The current best of breed of Macintoshes are slower than the current best of bread PCs. Mac�s are slower - just accept it. I don�t like it any more than you do.
my pc with xp pro ed did crash a few times and it does.
on the other hand , my macs with os x do not
darbus69
Apr 20, 06:57 PM
Wirelessly posted (Mozilla/5.0 (iPhone; U; CPU iPhone OS 4_3_1 like Mac OS X; en-us) AppleWebKit/533.17.9 (KHTML, like Gecko) Version/5.0.2 Mobile/8G4 Safari/6533.18.5)
btw, nvm, won't lower myself to ur level...
btw, nvm, won't lower myself to ur level...
flopticalcube
Apr 15, 01:21 PM
Godwined! FTW!
ten-oak-druid
Apr 9, 12:01 PM
When Apple Buys Nintendo eventually, it will be a good merge.
DeathChill
Apr 20, 08:32 PM
Too bad Apple products are few and far between. Want LTE phone? Sorry. Want phone with bigger screen? Sorry. Want computer with USB 3.0 or BluRay? Sorry. I guess you trained yourself not to want anything Steve Jobs does not like. You talk about Apple profits so much, it's likely the more Apple charges you the happier you are.
Want an LTE phone that can make it through the day? Sorry.
Want an LTE phone that can make it through the day? Sorry.
flopticalcube
Apr 24, 01:46 PM
In Hinduism, reincarnation is a natural part of life. As long as you follow the rules of the caste you belong to, you will get better incarnation next time. In Buddhism, reincarnation is not a state of hell in itself, but it's a barrier to salvation - and it's caused by the insatiability of human wants.
There are several hells in Hinduism, or maybe it's better to refer to them as "purgatories". The purgatories are called naraka and there are many of them. There are various narakas for different sinners, such as one for alcoholics, another one for liars, a third one for thieves, etc. The punishments are usually made to "fit the crime" in ironic ways. In most teachings of Buddhism, there is a similar cosmology.
The "flames of hell" have been mentioned many places in the New Testament, but the original texts translate literally to "flames of Gehenna". Gehenna was a landfill outside Jerusalem, a symbol of total destruction at the time. People were throwing sulfur down on the flames to keep the fire burning. In other words, the Christian "hell" was intially the cessation of existance. This is what Buddhists refer to as "nirvana", i.e. no more reincarnations. It's a paradox that what in one religion is seen as salvation, used to be the opposite in another.
One man's carrot is another man's stick, eh? It still looks to me that hell or the fear of some form of afterlife penalty is being used as an inducement to follow the religion.
There are several hells in Hinduism, or maybe it's better to refer to them as "purgatories". The purgatories are called naraka and there are many of them. There are various narakas for different sinners, such as one for alcoholics, another one for liars, a third one for thieves, etc. The punishments are usually made to "fit the crime" in ironic ways. In most teachings of Buddhism, there is a similar cosmology.
The "flames of hell" have been mentioned many places in the New Testament, but the original texts translate literally to "flames of Gehenna". Gehenna was a landfill outside Jerusalem, a symbol of total destruction at the time. People were throwing sulfur down on the flames to keep the fire burning. In other words, the Christian "hell" was intially the cessation of existance. This is what Buddhists refer to as "nirvana", i.e. no more reincarnations. It's a paradox that what in one religion is seen as salvation, used to be the opposite in another.
One man's carrot is another man's stick, eh? It still looks to me that hell or the fear of some form of afterlife penalty is being used as an inducement to follow the religion.
EvilEvil
Apr 9, 07:31 AM
Apple should be courting game developers, not their execs. These execs usually don't know much games other than to milk franchises until they're useless while the gameplay suffers.
joepunk
Mar 15, 12:52 AM
Someone has a Geiger Counter reading set up in Tokyo (I assume that is the location). If someone can explain this that would be wonderful.
LINK (http://park18.wakwak.com/~weather/geiger_index.html)
http://park18.wakwak.com/~weather/uploaddata/radiation.jpg (http://park18.wakwak.com/~weather/uploaddata/radiation.jpg)
LINK (http://park18.wakwak.com/~weather/geiger_index.html)
http://park18.wakwak.com/~weather/uploaddata/radiation.jpg (http://park18.wakwak.com/~weather/uploaddata/radiation.jpg)
MagnusVonMagnum
May 4, 02:39 PM
You're making a huge assumption that the people who vote on posts are the same people who are posting in a thread.
No, I'm making an assumption that fanboys are voting down all the anti-Apple posts in droves. Whether they have posted in the thread is completely irrelevant. The point is you don't see people voting in droves for logical posts, but you do see negative votes in any post that speaks either for Microsoft or against Apple, regardless of the content of that message. That implies emotional reaction which implies fanaticism. You can argue semantics, but 1+1 still equals 2. Sherlock Holmes didn't have to do a poll to figure things out.
a men#39;s style hat,
No, I'm making an assumption that fanboys are voting down all the anti-Apple posts in droves. Whether they have posted in the thread is completely irrelevant. The point is you don't see people voting in droves for logical posts, but you do see negative votes in any post that speaks either for Microsoft or against Apple, regardless of the content of that message. That implies emotional reaction which implies fanaticism. You can argue semantics, but 1+1 still equals 2. Sherlock Holmes didn't have to do a poll to figure things out.
Winni
Apr 21, 03:21 AM
Android is to Windows, as iOS is to Mac OS.
The similarities are astounding � Google is doing the same thing Microsoft did back in the day.
As much as Apple cares about marketshare, the experience is more important to them then the product itself. That's really something.
If they really cared that much about user experience, then iOS wouldn't be the Walled Garden that it is and iTunes wouldn't be such a royal pain in the neck to use.
Just an anecdote from my last week with an iPhone and a first generation Google G1 phone (which I have to use when I'm on 7/24-on call-duty): I moved to a new house where I do not yet have a DSL line and also no 3G/UMTS connectivity. Both the iPhone and the G1 use Deutsche Telekom, and while the iPhone always tells me that "it cannot activate the data network", the G1 manages to give me Internet access at the same location with the same carrier.
So in real world use, the iPhone lets me down while the Android phone does not.
The similarities are astounding � Google is doing the same thing Microsoft did back in the day.
As much as Apple cares about marketshare, the experience is more important to them then the product itself. That's really something.
If they really cared that much about user experience, then iOS wouldn't be the Walled Garden that it is and iTunes wouldn't be such a royal pain in the neck to use.
Just an anecdote from my last week with an iPhone and a first generation Google G1 phone (which I have to use when I'm on 7/24-on call-duty): I moved to a new house where I do not yet have a DSL line and also no 3G/UMTS connectivity. Both the iPhone and the G1 use Deutsche Telekom, and while the iPhone always tells me that "it cannot activate the data network", the G1 manages to give me Internet access at the same location with the same carrier.
So in real world use, the iPhone lets me down while the Android phone does not.
WiiDSmoker
Apr 20, 08:58 PM
Nope, doesn't work that way for many viruses. Even if you have show hidden files and folders and show hidden system files check to show they still don't necessarily show thats the problem, its either a bug in the OS or something legit that people are exploiting. You can't even get them in command prompt but you can see them when plugged into other OS's. They are usually in a folder along with a script that does something to keep them hidden, or something somewhere else keeps them hidden.
I honestly have no idea how you have the job that you do, because you fail tremendously in this aspect.
I honestly have no idea how you have the job that you do, because you fail tremendously in this aspect.
Macky-Mac
Mar 26, 09:27 PM
The Church wont bend on certain issues. This is one of those issues.
really, I don't think anybody would care, so long as the church didn't try to impose its views on people who aren't believers in your religion.
really, I don't think anybody would care, so long as the church didn't try to impose its views on people who aren't believers in your religion.
dgree03
Apr 28, 02:38 PM
Huh? A 2008 MBP should have no problem running iTunes.
Flash for Mac sucks even on the most high-end Macs. Why do you think Mac users tend to dislike Flash? It's not the Mac - it's Adobe.
Flash on my Air runs wonderfully... :rolleyes:
Flash for Mac sucks even on the most high-end Macs. Why do you think Mac users tend to dislike Flash? It's not the Mac - it's Adobe.
Flash on my Air runs wonderfully... :rolleyes:
Th3Crow
Apr 28, 08:13 PM
Are you? Why do you think Windows 7 sells so well? All Mac users need to buy one.
That's hilarious! Do you really believe that? Half of the people I know started out with Windoze, and have since migrated to Mac. They've never looked back. None of them would think of contaminating their Mac with Winblows. I don't know a single person that started out Mac and moved to PC. Not one. And none of them feel any need to run Windows.
That's hilarious! Do you really believe that? Half of the people I know started out with Windoze, and have since migrated to Mac. They've never looked back. None of them would think of contaminating their Mac with Winblows. I don't know a single person that started out Mac and moved to PC. Not one. And none of them feel any need to run Windows.
CIA
Apr 13, 01:12 AM
Currently I work as a producer for the NBA. If the face recognition works, that could be huge for what I do. We have to go through months and months of games pulling highlights of individual players. Currently we edit using Final Cut Pro systems. If the new system can accurately analyze faces and allow me to do a search for certain players, well, that would be friggin' awesome. I hope it works.
I was wracking my brain trying to figure out what the hell the face recognition feature would be used for. That makes sense, sports. Sadly we shoot a ton of skiing and snowboarding, so it probably won't work well for us since everyone is wearing hats/helmets and goggles.
I was wracking my brain trying to figure out what the hell the face recognition feature would be used for. That makes sense, sports. Sadly we shoot a ton of skiing and snowboarding, so it probably won't work well for us since everyone is wearing hats/helmets and goggles.