gnasher729
Jul 12, 01:31 PM
How much hotter would a MacBook Pro be with a single Woodcrest?
Why not Woodcrest for entire PRO line?
Please please please read through a few of the Merom / Conroe / Woodcrest thread. Using a single Woodcrest in _any_ machine is pure idiocy; chipsets are a few hundred dollars more expensive, hotter and not one bit faster than Conroe at the same clockspeed.
And using Conroe in a portable computer would be a highly questionable move. It uses twice the power of Merom at the same clockspeed and performance. It is a bit cheaper, but Apple would spend much more money for having to use much bigger batteries and a much more powerful cooling system. Macbook and Macbook Pro are really quiet if you use not more than about half their performance; at full performance the fans are quite noisy. With a Conroe chip, you would have the full noise at medium speed; Conroe running at full speed would make one hell of a noise and empty your batteries within minutes.
Why not Woodcrest for entire PRO line?
Please please please read through a few of the Merom / Conroe / Woodcrest thread. Using a single Woodcrest in _any_ machine is pure idiocy; chipsets are a few hundred dollars more expensive, hotter and not one bit faster than Conroe at the same clockspeed.
And using Conroe in a portable computer would be a highly questionable move. It uses twice the power of Merom at the same clockspeed and performance. It is a bit cheaper, but Apple would spend much more money for having to use much bigger batteries and a much more powerful cooling system. Macbook and Macbook Pro are really quiet if you use not more than about half their performance; at full performance the fans are quite noisy. With a Conroe chip, you would have the full noise at medium speed; Conroe running at full speed would make one hell of a noise and empty your batteries within minutes.
dante@sisna.com
Oct 26, 12:03 PM
Thank you for both those posts. I have felt pretty alone on these 8-core threads thus far. Glad to finally see someone else who understands and can explain so well why 8-cores is still not going to be enough joining in on these discussions.
Any of you who don't think a 16-core Mac Pro will be a hit in a year can really only be into word processing. :p
You are welcome.
I have been reading your Mac Rumors posts for a long time and I am amazed at the bashing you take sometimes. I recall the days when people complained of Apple boxes being "too slow."
Now the posts I read on supposed pro sites like Mac Rumors are filled with users chiding one's need for speed -- I get the feeling that many of the users in this forum do simply have the workload to truly push these machines -- there is almost a sense of envy at users who do.
My suggestion to users feeling this envy is as follows: Learn new skills. If you make your living using a Mac as we do, then evolve with your box. Buy new software. Seek out new clients who want higher end multimedia for web and other distribution. Push the market to evolve.
Anyhow, I will contribute as much as my schedule allows.
Best regards to all.
Dante
Any of you who don't think a 16-core Mac Pro will be a hit in a year can really only be into word processing. :p
You are welcome.
I have been reading your Mac Rumors posts for a long time and I am amazed at the bashing you take sometimes. I recall the days when people complained of Apple boxes being "too slow."
Now the posts I read on supposed pro sites like Mac Rumors are filled with users chiding one's need for speed -- I get the feeling that many of the users in this forum do simply have the workload to truly push these machines -- there is almost a sense of envy at users who do.
My suggestion to users feeling this envy is as follows: Learn new skills. If you make your living using a Mac as we do, then evolve with your box. Buy new software. Seek out new clients who want higher end multimedia for web and other distribution. Push the market to evolve.
Anyhow, I will contribute as much as my schedule allows.
Best regards to all.
Dante
logandzwon
May 2, 10:37 AM
Is your info from like 1993 ? Because this little known version of Windows dubbed "New Technology" or NT for short brought along something called the NTFS (New Technology File System) that has... *drumroll* ACLs and strict permissions with inheritance...
Unless you're running as administrator on a Windows NT based system, you're as protected as a "Unix/Linux" user. Of course, you can also run as root all the time under Unix, negating this "security".
So again I ask, what about Unix security protects you from these attacks that Windows can't do ?
While I generally agree with whqt your saying, most XP machines I've seen the primary account the owner uses is an Administrator account that allows any application full access to anything on the machine. Very few unix types do that.
Unless you're running as administrator on a Windows NT based system, you're as protected as a "Unix/Linux" user. Of course, you can also run as root all the time under Unix, negating this "security".
So again I ask, what about Unix security protects you from these attacks that Windows can't do ?
While I generally agree with whqt your saying, most XP machines I've seen the primary account the owner uses is an Administrator account that allows any application full access to anything on the machine. Very few unix types do that.
P-Worm
Sep 20, 07:13 AM
Is it possible that the cable ports on the back can be used for both input AND output? I don't see why not.
P-Worm
P-Worm
munkery
May 2, 04:05 PM
In Windows 7 you not only have the option to switch it on and off, you can also customize the intrusiveness of it, I find it much more user friendly than in OS X.
Switching off or turning down UAC in Windows also equally impacts the strength of MIC (Windows sandboxing mechanism) because it functions based on inherited permissions. Unix DAC in Mac OS X functions via inherited permissions but MAC (mandatory access controls -> OS X sandbox) does not. Windows does not have a sandbox like OS X.
UAC, by default, does not use a unique identifier (password) so it is more susceptible to attacks the rely on spoofing prompts that appear to be unrelated to UAC to steal authentication. If a password is attached to authentication, these spoofed prompts fail to work.
Having a password associated with permissions has other benefits as well.
So Safari auto-downloads, unarchives and auto-executes something, but you think it is safe because it's an installer ? :confused:
If "Open safe files after downloading" is turned on, it will both unarchive the zip file and launch the installer. Installers are marked as safe to launch because require authentication to complete installation.
I'm sorry, but I'm still curious about the "auto-execute" part. Why would it run the installer automatically after decompressing it. That sounds quite "unsafe" to me. Even without administrator privilege, that means code can still run that can affect the current user's account.
No harm can be done from just launching the installer. But, you are correct in that code is being executed in user space.
Code run in user space is used to achieve privilege escalation via exploitation or social engineering (trick user to authenticate -> as in this malware). There is very little that can be done beyond prank style attacks with only user level access. System level access is required for usefully dangerous malware install, such as keyloggers that can log protected passwords. This is why there is little malware for Mac OS X. Achieving system level access to Windows via exploitation is much easier.
Webkit2 will further reduce the possibility of even achieving user level access.
Switching off or turning down UAC in Windows also equally impacts the strength of MIC (Windows sandboxing mechanism) because it functions based on inherited permissions. Unix DAC in Mac OS X functions via inherited permissions but MAC (mandatory access controls -> OS X sandbox) does not. Windows does not have a sandbox like OS X.
UAC, by default, does not use a unique identifier (password) so it is more susceptible to attacks the rely on spoofing prompts that appear to be unrelated to UAC to steal authentication. If a password is attached to authentication, these spoofed prompts fail to work.
Having a password associated with permissions has other benefits as well.
So Safari auto-downloads, unarchives and auto-executes something, but you think it is safe because it's an installer ? :confused:
If "Open safe files after downloading" is turned on, it will both unarchive the zip file and launch the installer. Installers are marked as safe to launch because require authentication to complete installation.
I'm sorry, but I'm still curious about the "auto-execute" part. Why would it run the installer automatically after decompressing it. That sounds quite "unsafe" to me. Even without administrator privilege, that means code can still run that can affect the current user's account.
No harm can be done from just launching the installer. But, you are correct in that code is being executed in user space.
Code run in user space is used to achieve privilege escalation via exploitation or social engineering (trick user to authenticate -> as in this malware). There is very little that can be done beyond prank style attacks with only user level access. System level access is required for usefully dangerous malware install, such as keyloggers that can log protected passwords. This is why there is little malware for Mac OS X. Achieving system level access to Windows via exploitation is much easier.
Webkit2 will further reduce the possibility of even achieving user level access.
puma1552
Mar 12, 03:43 AM
Oh cr*p. The headline is 'huge explosion'.
I think it's clearly time to start making comparisons with Chernobyl and discussing how widespread the radiation damage is now potentially gong to be rather than praising how Japanese reactors are different to Soviet ones. That huge cloud of smoke is enough to tell anyone expert or not that this is already way beyond just getting backup cooling diesel generators operational again - we're witnessing a massive disaster genuine bona fide China Syndrome meltdown.
Why is this Chernobyl?
What are the similarities?
What are the differences?
What's your background?
Do you understand why Chernobyl is uninhabitable for several hundred years, while Hiroshima and Nagasaki are thriving, gorgeous cities?
Did you freak out at the "1000x" radiation levels too, like the rest of the western media did who didn't have the remotest clue that it was still magnitudes below the hazardous level? You certainly buy into the "Huge Explosion!!!" headlines, as evidenced by your post, so it's hard to take anything you say seriously.
It's a serious situation, but you are panicking a little too much, with next to zero information.
I think it's clearly time to start making comparisons with Chernobyl and discussing how widespread the radiation damage is now potentially gong to be rather than praising how Japanese reactors are different to Soviet ones. That huge cloud of smoke is enough to tell anyone expert or not that this is already way beyond just getting backup cooling diesel generators operational again - we're witnessing a massive disaster genuine bona fide China Syndrome meltdown.
Why is this Chernobyl?
What are the similarities?
What are the differences?
What's your background?
Do you understand why Chernobyl is uninhabitable for several hundred years, while Hiroshima and Nagasaki are thriving, gorgeous cities?
Did you freak out at the "1000x" radiation levels too, like the rest of the western media did who didn't have the remotest clue that it was still magnitudes below the hazardous level? You certainly buy into the "Huge Explosion!!!" headlines, as evidenced by your post, so it's hard to take anything you say seriously.
It's a serious situation, but you are panicking a little too much, with next to zero information.
kdarling
Apr 20, 07:37 PM
Interesting and "generic" use by Apple execs. This could be used against them, as compared to saying that our "App Store" is the largest of any of the available applications stores. Subtle, but significant.
Good catch to all those who noticed Cook's generic use with "we've got the largest app store".
The manual for (my wife's Android) phone is 156 pages long. I couldn't find the buttons illustrated in it to set up another email address other than Gmail.
Last time I checked online, Apple's official iPhone user manual was 244 pages long.
Not to mention that there's probably a hundred iPhone help books for people who can't figure it out.
And to think that the ENTIRE Droid market is unregulated? More and more viruses will appear. You can't get a virus on an iPhone unless Apple somehow lets it in.
Apple's approval of an app does not guarantee that it doesn't have a Trojan or other malware. It simply means that it passes their app rules and doesn't violate copyrights. Each OS update has included fixes for buffer overruns and other holes which could've allowed anyone full access.
Perhaps you didn't realize MILLIONS of Android users downloaded malware.
Hardly. Do you mean the ~100,000 who recently downloaded apps that the someone stuck a root kit in, but which otherwise didn't do anything? And which were deleted within minutes of Google finding out?
Good catch to all those who noticed Cook's generic use with "we've got the largest app store".
The manual for (my wife's Android) phone is 156 pages long. I couldn't find the buttons illustrated in it to set up another email address other than Gmail.
Last time I checked online, Apple's official iPhone user manual was 244 pages long.
Not to mention that there's probably a hundred iPhone help books for people who can't figure it out.
And to think that the ENTIRE Droid market is unregulated? More and more viruses will appear. You can't get a virus on an iPhone unless Apple somehow lets it in.
Apple's approval of an app does not guarantee that it doesn't have a Trojan or other malware. It simply means that it passes their app rules and doesn't violate copyrights. Each OS update has included fixes for buffer overruns and other holes which could've allowed anyone full access.
Perhaps you didn't realize MILLIONS of Android users downloaded malware.
Hardly. Do you mean the ~100,000 who recently downloaded apps that the someone stuck a root kit in, but which otherwise didn't do anything? And which were deleted within minutes of Google finding out?
NebulaClash
Apr 28, 08:33 AM
Do you still see masses of people with White or Black iPods?
Yes. A very common sight even in 2011.
Yes. A very common sight even in 2011.
mroddjob
Apr 13, 05:24 AM
I'm confused as to why everyone is saying this is a step down from FCP7, from what I saw of the feeds apple were just showcasing some of the new features. I may be wrong but i didn't see anywhere where they said they were taking functionality out. They didn't mention color or the rest of FCS but they didn't say they were getting rid of everything. So how can people say this has dropped down to a prosumer level?
If all they did was re-write with 64 bit support then it would be a step up, but they also added some new useful features, (may not be game changing but i'm sure everyone will find something that will be helpful rather than a hindrance). In which case, in my book this still makes it pro software.
It was a first look at beta software, they haven't said they've removed anything so everything people are saying is just speculation for the sake of complaining.
If all they did was re-write with 64 bit support then it would be a step up, but they also added some new useful features, (may not be game changing but i'm sure everyone will find something that will be helpful rather than a hindrance). In which case, in my book this still makes it pro software.
It was a first look at beta software, they haven't said they've removed anything so everything people are saying is just speculation for the sake of complaining.
MacRumors
Oct 7, 10:30 AM
http://www.macrumors.com/images/macrumorsthreadlogo.gif (http://www.macrumors.com/iphone/2009/10/07/android-to-surpass-iphone-in-market-share-by-2012/)
Computerworld reports (http://www.computerworld.com/s/article/9139026/Android_to_grab_No._2_spot_by_2012_says_Gartner) that research firm Gartner is forecasting significant growth in Google's Android operating system for smart phones, noting that it expects Android to surpass Apple's iPhone to claim the number two spot behind Symbian OS with 14.5% of the global smart phone market by 2012.While the first Android product release, the T-Mobile G1, only won a lukewarm response, Android 1.5 (code-named Cupcake) is well thought-out, Dulaney said. Other expected improvements in Android for its application store and development environment will be "backed by the power of Google's search engine," he said. "Google's other up-and-coming consumer and enterprise products should make[Android] a dominant platform."
And because Android and Google operate in an "integrative and open environment, [they] could easily top ... the singular Apple," he said.
Android will also run on phones from several manufacturers, helping its growth, especially when compared to the iPhone, Dulaney said. In as many as 40 models of Android devices will ship, and the next OS update, code-named Donut, will ship in the second quarter, Dulaney predicted.The predicted margin is small, however, with Apple predicted to grab 13.7% of the smart phone market in 2012. Both companies are forecasted to take significant share from Symbian, which currently holds approximately 50% market share but is expected to fall to 39% over that time.
Article Link: Android to Surpass iPhone in Market Share by 2012? (http://www.macrumors.com/iphone/2009/10/07/android-to-surpass-iphone-in-market-share-by-2012/)
Computerworld reports (http://www.computerworld.com/s/article/9139026/Android_to_grab_No._2_spot_by_2012_says_Gartner) that research firm Gartner is forecasting significant growth in Google's Android operating system for smart phones, noting that it expects Android to surpass Apple's iPhone to claim the number two spot behind Symbian OS with 14.5% of the global smart phone market by 2012.While the first Android product release, the T-Mobile G1, only won a lukewarm response, Android 1.5 (code-named Cupcake) is well thought-out, Dulaney said. Other expected improvements in Android for its application store and development environment will be "backed by the power of Google's search engine," he said. "Google's other up-and-coming consumer and enterprise products should make[Android] a dominant platform."
And because Android and Google operate in an "integrative and open environment, [they] could easily top ... the singular Apple," he said.
Android will also run on phones from several manufacturers, helping its growth, especially when compared to the iPhone, Dulaney said. In as many as 40 models of Android devices will ship, and the next OS update, code-named Donut, will ship in the second quarter, Dulaney predicted.The predicted margin is small, however, with Apple predicted to grab 13.7% of the smart phone market in 2012. Both companies are forecasted to take significant share from Symbian, which currently holds approximately 50% market share but is expected to fall to 39% over that time.
Article Link: Android to Surpass iPhone in Market Share by 2012? (http://www.macrumors.com/iphone/2009/10/07/android-to-surpass-iphone-in-market-share-by-2012/)
digitalbiker
Sep 12, 04:10 PM
If this is all iTV is going to offer for $249 then forget it.
I'll just use a cable to hook my laptop to my TV.
Voila! I just replaced iTV for less than $5.00.
I'll just use a cable to hook my laptop to my TV.
Voila! I just replaced iTV for less than $5.00.
JFreak
Jul 12, 05:24 AM
I bet the the Quad G5 will retain their value for awhile.
Yes, it will. Given that many pro apps are still not Universal, and that many times first ported version is somewhat buggy, the PPC hardware running native PPC software will become very valuable during the next 12ish months.
Why does it seem that about 105% of Mac-users are Photoshop-users as well (I bet that PhotoShop-users are in fact in the minority)?
Because 105% of Mac-users have bought Photoshop Elements bundled with a digital camera. 95% of those never bother to upgrade to full version and 82% of those never use the software anyway. Oh, and 67% of statistics are made on spot ;)
Yes, it will. Given that many pro apps are still not Universal, and that many times first ported version is somewhat buggy, the PPC hardware running native PPC software will become very valuable during the next 12ish months.
Why does it seem that about 105% of Mac-users are Photoshop-users as well (I bet that PhotoShop-users are in fact in the minority)?
Because 105% of Mac-users have bought Photoshop Elements bundled with a digital camera. 95% of those never bother to upgrade to full version and 82% of those never use the software anyway. Oh, and 67% of statistics are made on spot ;)
gopher
Oct 9, 07:28 AM
If Windows XP didn't have so much spyware attached to it, and required registration, and the insecurity that Microsoft is so famous for on its systems (yes there are still as many bugs and holes in XP for hackers to get through as in Windows 2000 and before), and the fact remains none of the source code is open, where at least some of Mac OS X is open and free for development purposes, I would have gone to Microsoft. Speed doesn't matter a hill of beans if your machine is so insecure you can't trust your bank numbers to it. Macs are faster in some cases than Windows XP, while slower in others and they maintain a level of security that doesn't require a firewall or anti-virus program anywhere near as much as Windows XP does.
I'd rather fly an airplane than a space shuttle with o-rings that leak.
What's more, who really wants to be forced to support Microsoft?
With a Mac you can avoid Microsoft altogether.
I'd rather fly an airplane than a space shuttle with o-rings that leak.
What's more, who really wants to be forced to support Microsoft?
With a Mac you can avoid Microsoft altogether.
Chupa Chupa
Aug 29, 11:10 AM
This should be a Page 2 story at best. Let's be clear about what this bit of propaganda is... We know Greenpeace is anti-technology, anti-capitalism. They know Apple is not only a huge success story, but also has a big presence in consumer's minds. Everyone knows Apple and iPods. Clearly Greenpeace, like the iPod labor camp story before it, is USING Apple to forward their own agenda of killing technology and thwarting capitalism and innovation.
KnightWRX
May 2, 04:35 PM
Is anybody actually bothering to do this in the wild against any OS?
The types of attacks you are referring to are not occurring in the wild on a massive scale. When was the last time you heard about one in the media?
Again, look, if you're not interested in the mechanics, that's fine. Stop replying to me.
My post is inquiring about the mechanics. For the past hour, I've been trying to find how this thing ticks by searching around for in-depth articles (none to find, everyone just points to Intego's brief overview that is seriously lacking in details) or for the archive itself.
If you don't want to take this discussion to the technical level I am trying to take it, just don't participate.
At the moment, there is no way to prevent the kinds of attacks you are referring to on any OS if a vulnerability exists that allows the attacker to exploit a running application.
I don't know of any other Web browser (this is not a OS problem, it's a Safari problem). that automatically assumes executables are safe and thus should be auto-executed.
Webkit2 will reduce access to user space when Safari (or any app using webkit2) is exploited by restricting the privileges of apps on a per app basis.
What does Webkit2 have anything to do with running an installer on the OS after downloading it ? That happens outside the rendering engine's sandbox. You're not quite understanding what this sandbox does if you think this protects you against these types of attacks.
Turn off "Open safe files after downloading" if you are worried about that type of attack implemented via "safe" files.
I think you missed the part where I don't use Safari. I'm pretty far away from allowing it to "auto-run" "safe" files (I choose what I want to run).
Again munkery, I appreciate you taking the time to respond, but I'm not some noob user. You are not answering my inquiries nor helping any here at the level I want to discuss this. I get everything you are saying. I've been getting that level for quite a few years. I'm trying to discuss at another level here. Do you want to participate or not at a higher level where we discuss the actual mechanics of this rather than just starring at the tip of the iceberg ?
The types of attacks you are referring to are not occurring in the wild on a massive scale. When was the last time you heard about one in the media?
Again, look, if you're not interested in the mechanics, that's fine. Stop replying to me.
My post is inquiring about the mechanics. For the past hour, I've been trying to find how this thing ticks by searching around for in-depth articles (none to find, everyone just points to Intego's brief overview that is seriously lacking in details) or for the archive itself.
If you don't want to take this discussion to the technical level I am trying to take it, just don't participate.
At the moment, there is no way to prevent the kinds of attacks you are referring to on any OS if a vulnerability exists that allows the attacker to exploit a running application.
I don't know of any other Web browser (this is not a OS problem, it's a Safari problem). that automatically assumes executables are safe and thus should be auto-executed.
Webkit2 will reduce access to user space when Safari (or any app using webkit2) is exploited by restricting the privileges of apps on a per app basis.
What does Webkit2 have anything to do with running an installer on the OS after downloading it ? That happens outside the rendering engine's sandbox. You're not quite understanding what this sandbox does if you think this protects you against these types of attacks.
Turn off "Open safe files after downloading" if you are worried about that type of attack implemented via "safe" files.
I think you missed the part where I don't use Safari. I'm pretty far away from allowing it to "auto-run" "safe" files (I choose what I want to run).
Again munkery, I appreciate you taking the time to respond, but I'm not some noob user. You are not answering my inquiries nor helping any here at the level I want to discuss this. I get everything you are saying. I've been getting that level for quite a few years. I'm trying to discuss at another level here. Do you want to participate or not at a higher level where we discuss the actual mechanics of this rather than just starring at the tip of the iceberg ?
Hildron101010
Apr 12, 10:22 PM
Steve Jobs said the new version would be "awesome," well I disagree. He was completely wrong... IT IS FREAKIN' ASTOUNDING! Bravo Apple!
_________________________________________________
For the PCs of tomorrow, look at the Macs of today.
_________________________________________________
For the PCs of tomorrow, look at the Macs of today.
appleguy123
Apr 23, 12:34 AM
Unchecked in what sense of the word "unchecked?"
Not checked for efficiency or flaws.
Not checked for efficiency or flaws.
bokdol
May 2, 01:57 PM
i just cleaned out of the the computers at work. and the person had the installer window still open. they pressed ok but because they had 10 other windows open they really did not realize they authorized it to install.
it is not that they did not authorize it's that their computer had soo much stuff on they did not realize they authorized it.
it is not that they did not authorize it's that their computer had soo much stuff on they did not realize they authorized it.
Rodimus Prime
Mar 13, 04:48 PM
Wind would be fine as a back bone source if the geographical spread was big enough (it's always windy in one area or another) and in spite of people saying energy storage is a problem in fact it's not.(see for instance the Ffestiniog Power Station in north Wales which has been operating since the early sixties)
wind is not considered fine. We can only count on about 30% of it at any one time. Biggest plus they provide us is that it reduces the stress on our other systems. They allow other power planets to run at lower points and not burn as much fuel.
30% is not considered a good back bone.
Energy storage is yes a problem. We can store some but it is not cost effective.
wind is not considered fine. We can only count on about 30% of it at any one time. Biggest plus they provide us is that it reduces the stress on our other systems. They allow other power planets to run at lower points and not burn as much fuel.
30% is not considered a good back bone.
Energy storage is yes a problem. We can store some but it is not cost effective.
OllyW
Apr 21, 07:06 AM
I struggle with the LTE angle mainly due to the fact in the UK we haven't even got visual voicemail working on the iPhone 4
Speak for yourself, it works on mine. :p
Speak for yourself, it works on mine. :p
Aduntu
Apr 22, 08:26 PM
Well supported points there :rolleyes:.
There are a-lot of atheists on these boards because there are quite a few far left atheists on these boards. Leftists are more likely to be atheists.
I like to believe it's because they make their decisions based on logic and reason.
Because the concept of earth and life just happening to explode into existence from nothing comes from logic and reason?
Interesting...
There are a-lot of atheists on these boards because there are quite a few far left atheists on these boards. Leftists are more likely to be atheists.
I like to believe it's because they make their decisions based on logic and reason.
Because the concept of earth and life just happening to explode into existence from nothing comes from logic and reason?
Interesting...
mike31mets
Apr 22, 06:34 PM
I was in the same boat as the OP a few years back. My circumstances and motivations in learning OS X were a bit than the OP's. I've learned a good deal about OS X. The things it can and can't do and how it differs from Windows.
So some of the stuff in this thread I knew about, but the one that I still can't figure out is switching between all windows. Everyone says just use CMD + ~. However when I do that on my iMac, all I get is a switch between windows in a particular application. I'm using the Apple standard wired keyboard with numberpad.
In Windows, ATL + Tab switches between all windows (and it shows you the windows in a preview much like CMD + Tab does with applications).
So some of the stuff in this thread I knew about, but the one that I still can't figure out is switching between all windows. Everyone says just use CMD + ~. However when I do that on my iMac, all I get is a switch between windows in a particular application. I'm using the Apple standard wired keyboard with numberpad.
In Windows, ATL + Tab switches between all windows (and it shows you the windows in a preview much like CMD + Tab does with applications).
suneohair
Oct 26, 12:01 PM
I highly doubt this will be a simple swap. The Clovertowns are quite expensive, not to mention slower in terms of raw clock speed, so expect it to be a high priced upgrade.
joepunk
Mar 11, 08:13 PM
0143: Tokyo Electric Power releases more radioactive vapour from a second sticken reactor, AFP reports.