Toneaphone
Feb 25, 03:39 PM
Even though Android has more potential users, they will never be as successful as the iPhone until they improve their app capabilities. Once they do this, developers will make better apps and games, and customers will buy more. It ultimately boils down to the degree of consumption per user rather than the quantity of potential customers. One person can easily install 150+ apps for the iPhone in no time. Over 3 billion apps have been downloaded to date...It will be an extremely long time until Android meets that milestone.
KnightWRX
May 2, 06:55 PM
Bugs are flaws in the overall security model.
Bugs are flaws in the implementation, not the model, at least for those you are referring to. Unless you have a model flaw to demonstrate (like the SSL protocol of 2009 bug) you're being completely besides the point.
Part of an OSs security model includes the implementation of exploit mitigations. The best exploit mitigation is to have as few bugs as possible. Obviously, in relation to privilege escalation, OS X has far fewer bugs.
Again, this has nothing to do with the "Unix security model", only to less known bugs.
At this point, I doubt you're even interested in having a serious discussion on this issue... I think I'll just stop replying to you.
Bugs are flaws in the implementation, not the model, at least for those you are referring to. Unless you have a model flaw to demonstrate (like the SSL protocol of 2009 bug) you're being completely besides the point.
Part of an OSs security model includes the implementation of exploit mitigations. The best exploit mitigation is to have as few bugs as possible. Obviously, in relation to privilege escalation, OS X has far fewer bugs.
Again, this has nothing to do with the "Unix security model", only to less known bugs.
At this point, I doubt you're even interested in having a serious discussion on this issue... I think I'll just stop replying to you.
peharri
Sep 24, 05:18 PM
Mac Mini? I suspect that's exactly what Apple wants to drive sales of.
I know, they need to be cheaper.
Well, my view is that the $300 iTV will not work if it needs $600 worth of computer attached to it, especially if the sole role of the computer is as some kind of file server. Even more especially (!) if the $600 computer doesn't come with that much storage anyway, and the even even even more if viewing content on your TV means going into the bedroom to download the program onto the computer, and then walking back into the livingroom to watch it.
Now a $200 server might make some sense, but ultimately I can't help but think anything that adds to the start-up cost of the iTV will sink it.
Ultimately, I'm of the opinion Apple isn't suicidal. It does intend the iTV to be desirable. It plans to use it to ensure the iTS remains relevent. It plans to expand, not retract, its online media business. It doesn't consider the Mac to be so important it needs to be pushed to the detriment of the rest of the business. It is worried about the post-iPod future. It does need to find a way of selling online movie downloads to sceptical studio executives. For all of these reasons and more, I'm finding the notion Apple would release a $300 TV adapter and announce it at a movies download event a little... well, does it make sense to you?
You know who's fault this is? It's Apple's. If they hadn't done that stupid "Fun products" presentation back in February, with those stupid leather iPod cases and the overpriced speaker system, I think people would be a whole lot more positive!
I know, they need to be cheaper.
Well, my view is that the $300 iTV will not work if it needs $600 worth of computer attached to it, especially if the sole role of the computer is as some kind of file server. Even more especially (!) if the $600 computer doesn't come with that much storage anyway, and the even even even more if viewing content on your TV means going into the bedroom to download the program onto the computer, and then walking back into the livingroom to watch it.
Now a $200 server might make some sense, but ultimately I can't help but think anything that adds to the start-up cost of the iTV will sink it.
Ultimately, I'm of the opinion Apple isn't suicidal. It does intend the iTV to be desirable. It plans to use it to ensure the iTS remains relevent. It plans to expand, not retract, its online media business. It doesn't consider the Mac to be so important it needs to be pushed to the detriment of the rest of the business. It is worried about the post-iPod future. It does need to find a way of selling online movie downloads to sceptical studio executives. For all of these reasons and more, I'm finding the notion Apple would release a $300 TV adapter and announce it at a movies download event a little... well, does it make sense to you?
You know who's fault this is? It's Apple's. If they hadn't done that stupid "Fun products" presentation back in February, with those stupid leather iPod cases and the overpriced speaker system, I think people would be a whole lot more positive!
KnightWRX
Apr 28, 09:12 AM
Tablets like the iPad, Xoom, G-Slate, heck, even smartphones like the iPhone, Droid, Incredible, etc.. are all lower case "pc"s. As in, they are computers that are personal. They aren't upper case PCs, as in IBM PC compatible.
Servers based on Intel architecture processors like the C7000 chassis blades are not lower case "pc"s, as in, they aren't personal computer systems. They are servers (also why are we talking about servers here ? Is there even any evidence Catalyst is including those in HP's and Dell's numbers ? I doubt they are...). They are however (again, the Intel variant) upper case PCs, as in IBM PC compatible .
PC (Personal Computer) is an architecture defined in the 80s by IBM. pc is a personal computer. Learn the difference boys and girls.
Should the Tablet sales be included in charts like these ? I don't think so, this is just a very pro Apple analyst group trying to make it look like Apple is having more success in a segment they have usually lagged a bit in (though in which they are still showing quite the growth and beating expectations without the iPad).
Servers based on Intel architecture processors like the C7000 chassis blades are not lower case "pc"s, as in, they aren't personal computer systems. They are servers (also why are we talking about servers here ? Is there even any evidence Catalyst is including those in HP's and Dell's numbers ? I doubt they are...). They are however (again, the Intel variant) upper case PCs, as in IBM PC compatible .
PC (Personal Computer) is an architecture defined in the 80s by IBM. pc is a personal computer. Learn the difference boys and girls.
Should the Tablet sales be included in charts like these ? I don't think so, this is just a very pro Apple analyst group trying to make it look like Apple is having more success in a segment they have usually lagged a bit in (though in which they are still showing quite the growth and beating expectations without the iPad).
fpnc
Mar 18, 04:59 PM
There are two reason why this doesn't mean much. First, Apple may just cancel the accounts of anyone who tries to use PyMusique (that's covered by the iTunes Music Store Terms Of Service agreement). Second, it would be very easy to make this a violation of the DMCA (if it already isn't), all Apple would have to do is implement a "weak" encryption, like adding a zero to the start of the music stream and more zeros thereafter at 256 byte intervals. The DMCA doesn't say anything about how "good" the protection needs to be, so if anyone used a tool to strip those values they would be in violation of the DMCA.
I suspect, in any case, that the iTunes Music Store doesn't broadcast the unprotected AAC file completely in the clear or as an uninterrupted stream of AAC data, so PyMusique may already violate the DMCA.
The most important thing to note, however, is if you use PyMusique you may have your account cancelled (and Apple knows who you are and where you "live" based upon your credit card). So, if you really want to take that risk go ahead. And remember, you could also be found guilty of violating the DMCA even if you just try to use this tool. It's almost like you were planning of going online to one of the illegal music sharing sites, documenting your activities, and then sending that information directly to the RIAA with your name and address with a note asking them to prosecute. Basically, you're stupid to even try to use PyMusique.
This is just a headline grabber or a means to raise the "fair use" banner.
Edit: replaced reference to EULA with iTunes Music Store Terms Of Service.
I suspect, in any case, that the iTunes Music Store doesn't broadcast the unprotected AAC file completely in the clear or as an uninterrupted stream of AAC data, so PyMusique may already violate the DMCA.
The most important thing to note, however, is if you use PyMusique you may have your account cancelled (and Apple knows who you are and where you "live" based upon your credit card). So, if you really want to take that risk go ahead. And remember, you could also be found guilty of violating the DMCA even if you just try to use this tool. It's almost like you were planning of going online to one of the illegal music sharing sites, documenting your activities, and then sending that information directly to the RIAA with your name and address with a note asking them to prosecute. Basically, you're stupid to even try to use PyMusique.
This is just a headline grabber or a means to raise the "fair use" banner.
Edit: replaced reference to EULA with iTunes Music Store Terms Of Service.
rjjkp
May 31, 09:22 PM
:apple: How would you go about finding out if a phone or carrier service worked in a certain area if you didn't consult other people or credible sources? Wouldn't you have to make a decision based on 'Other Peoples Opinions' in order to find out? If you know Verizon service yields 0 bars in your area do you know this as a previous Verizon service customer, consult someone directly or take the 'Opinion' of the AT&T salesman?
Are you so inflexible as to believe no one in the universe has occasional connection problems? Do you live under an AT&T tower and never stray far from it? I'm looking to get an iPhone in 2 months and I hope it really is as reliable as you describe.
I have set up a contract with a provider BEFORE committing to a long iphone contract. I go into the said telephone store and set up some other non iphone device. Then return home and test its capability and signal strength. If it is acceptable I return the above phone for a full refund(I use it far less than the maximum 30 days. Then when the desired iphone is purchased I will expect the same performance.
Are you so inflexible as to believe no one in the universe has occasional connection problems? Do you live under an AT&T tower and never stray far from it? I'm looking to get an iPhone in 2 months and I hope it really is as reliable as you describe.
I have set up a contract with a provider BEFORE committing to a long iphone contract. I go into the said telephone store and set up some other non iphone device. Then return home and test its capability and signal strength. If it is acceptable I return the above phone for a full refund(I use it far less than the maximum 30 days. Then when the desired iphone is purchased I will expect the same performance.
FX120
May 2, 01:22 PM
This is partially because due to a design flaw in Windows, many third-party applications won't even run unless they have administrator access (silly, no?).
So outdated software or poor programming = Design flaw in Windows?
Don't get me wrong, I have some legacy applications that won't run without elevated permissions, but they're just that, legacy applications. I suppose Microsoft could just take Apples approach and forcibly antiquate software.
So outdated software or poor programming = Design flaw in Windows?
Don't get me wrong, I have some legacy applications that won't run without elevated permissions, but they're just that, legacy applications. I suppose Microsoft could just take Apples approach and forcibly antiquate software.
toddybody
Apr 15, 10:11 AM
Hahaha, if I doubted your gayness for one second, you really convinced me with that last part..."self-hate". (very standard, piss-poor rebuttal I get from every butt-hurt gay (no pun intended!) that feels MY views don't align with theirs)
Sorry, kiddo, I do not hate myself or my fellow gays and lesbians. AT ALL. Go ahead and step outta the glittered box you live in and learn to understand that one does NOT have to support every single aspect of this lifestyle. Are you effing crazy, dude!??
We're all quick to criticize the Apple fanboys who drink Steve's kool-aid, but guess what, I'm no "fanboy". I'm a gay male. Not an uber fan of the gay agenda that supports every bit of it. I don't. DEAL WITH IT.
How dare you say I hate myself just because I have a entirely different point of view.
Theres ways to express your opinion (even if its pretty unpopular) without stooping to this. Not Cool
Sorry, kiddo, I do not hate myself or my fellow gays and lesbians. AT ALL. Go ahead and step outta the glittered box you live in and learn to understand that one does NOT have to support every single aspect of this lifestyle. Are you effing crazy, dude!??
We're all quick to criticize the Apple fanboys who drink Steve's kool-aid, but guess what, I'm no "fanboy". I'm a gay male. Not an uber fan of the gay agenda that supports every bit of it. I don't. DEAL WITH IT.
How dare you say I hate myself just because I have a entirely different point of view.
Theres ways to express your opinion (even if its pretty unpopular) without stooping to this. Not Cool
skunk
Mar 25, 06:59 PM
I try to, but public service keeps dragging me away.I thought this was your idea of public service.
And it's getting damn annoying.You're not wrong.
And it's getting damn annoying.You're not wrong.
0-172
Apr 9, 10:54 AM
When discussing Nintendo, you guys aren't taking into account DSiWare and soon 3DSWare. They're a means of digitally distributing little games, much like those of iOS, for cheaper prices (pretty much maxing out at $10).
Although they obviously still rely on the sale of physical games, Nintendo is beginning to adapt to this cheaper, digital means of sale.
Although they obviously still rely on the sale of physical games, Nintendo is beginning to adapt to this cheaper, digital means of sale.
munkery
May 2, 08:18 PM
Problems with Windows security in comparison to Mac OS X presented just in this thread:
1) Greater number of privilege escalation vulnerabilities:
Here is a list of privilege escalation (UAC bypass) vulnerabilities just related to Stuxnet (win32k.sys) in Windows in 2011:
http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=win32k.sys+2011
Here is a list of all of the privilege escalation vulnerabilities in Mac OS X in 2011:
http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=Mac+OS+X+privileges+2011
2) Earlier versions of NT based Windows (Windows XP and earlier) do not use discretionary access controls by default.
3) Permissions system does not include a user defined unique identifier (password) by default. More susceptible to user space exploitation leading to authentication stolen via spoofed prompt that appears unrelated to UAC because password not associated with authentication.
4) Windows sandbox mechanism relies on inherited permissions so that turning off UAC turns off the sandbox. This sandbox has been defeated in the wild (in the last two pwn2owns).
I do not know of any TrustedBSD MAC framework (BSD and Mac sandbox), AppArmor (openSUSE and Ubuntu), or SE Linux (Fedora) mandatory access control escapes? These sandbox mechanisms do not rely on inherited permissions.
5) The Windows registry is a single point of failure that can be leveraged by malware.
EDIT:
If malware doesn't need to use some method to achieve privilege escalation or actively phish users for their credit card number to be profitable enough to warrant their creation, then why did the specific example of malware that started this thread rely on these methods to be profitable?
Why did it not use the methods presented by KnightWRX? Why do you not see malware that only uses user level access to upload a user's data files to achieve some effect that is profitable? I can't recall any malware that uses this method.
Is it because most users do not have valuable info stored in insecure data files? I keep that type of info in encrypted secured notes in Keychain Access or in encrypted sparse bundle disk images.
Is it because it would require too much time to data mine the files for valuable info in relation to the amount of profit gained? How many GBs of data are on your system? Even the data I keep in encrypted sparse bundle disk images wouldn't be very useful for identity theft even if it was not encrypted.
Is it because given all the variables it is more cost effective to go after achieving system level access to keystroke log passwords protected by user space security mechanisms or simply to use basic phishing scams on unknowledgeable users? Makes sense to me but maybe I am wrong.
1) Greater number of privilege escalation vulnerabilities:
Here is a list of privilege escalation (UAC bypass) vulnerabilities just related to Stuxnet (win32k.sys) in Windows in 2011:
http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=win32k.sys+2011
Here is a list of all of the privilege escalation vulnerabilities in Mac OS X in 2011:
http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=Mac+OS+X+privileges+2011
2) Earlier versions of NT based Windows (Windows XP and earlier) do not use discretionary access controls by default.
3) Permissions system does not include a user defined unique identifier (password) by default. More susceptible to user space exploitation leading to authentication stolen via spoofed prompt that appears unrelated to UAC because password not associated with authentication.
4) Windows sandbox mechanism relies on inherited permissions so that turning off UAC turns off the sandbox. This sandbox has been defeated in the wild (in the last two pwn2owns).
I do not know of any TrustedBSD MAC framework (BSD and Mac sandbox), AppArmor (openSUSE and Ubuntu), or SE Linux (Fedora) mandatory access control escapes? These sandbox mechanisms do not rely on inherited permissions.
5) The Windows registry is a single point of failure that can be leveraged by malware.
EDIT:
If malware doesn't need to use some method to achieve privilege escalation or actively phish users for their credit card number to be profitable enough to warrant their creation, then why did the specific example of malware that started this thread rely on these methods to be profitable?
Why did it not use the methods presented by KnightWRX? Why do you not see malware that only uses user level access to upload a user's data files to achieve some effect that is profitable? I can't recall any malware that uses this method.
Is it because most users do not have valuable info stored in insecure data files? I keep that type of info in encrypted secured notes in Keychain Access or in encrypted sparse bundle disk images.
Is it because it would require too much time to data mine the files for valuable info in relation to the amount of profit gained? How many GBs of data are on your system? Even the data I keep in encrypted sparse bundle disk images wouldn't be very useful for identity theft even if it was not encrypted.
Is it because given all the variables it is more cost effective to go after achieving system level access to keystroke log passwords protected by user space security mechanisms or simply to use basic phishing scams on unknowledgeable users? Makes sense to me but maybe I am wrong.
dukebound85
Mar 15, 07:18 PM
I did a little reading and now am a one minute expert... :p
I've read these reactors did auto shut down when the earthquake hit. The problem is that the rods create tremendous persistent heat even after a shutdown, and it is the lack of cooling water that is causing the problem.
Yes, lack of cooing is the issue as it uncovers the core
Could it be considered a myth that any nuclear reactor can be expected to automatically safely shutdown when power to all safety systems are lost no matter how it is designed?
Not really. When all power is lost, the plant is still able to cool itself through other means
And who was saying this could not be like Chernobyl??
Chernobyl utilized a design that did not utilize many of the safety systems in place as today's plants, such as having multiple layers of containment for one...
I've read these reactors did auto shut down when the earthquake hit. The problem is that the rods create tremendous persistent heat even after a shutdown, and it is the lack of cooling water that is causing the problem.
Yes, lack of cooing is the issue as it uncovers the core
Could it be considered a myth that any nuclear reactor can be expected to automatically safely shutdown when power to all safety systems are lost no matter how it is designed?
Not really. When all power is lost, the plant is still able to cool itself through other means
And who was saying this could not be like Chernobyl??
Chernobyl utilized a design that did not utilize many of the safety systems in place as today's plants, such as having multiple layers of containment for one...
d.perel
Mar 18, 04:01 PM
Echoing a comment I saw elsewhere, why doesn't someone just hire this guy. It probably costs more for Apple to sue each person than it would be to hire them and keep them busy fixing these problems internally.
This is one of those nuts who thinks he is for the common good, and has already won lawsuits against movie companies challenging his dvd-decryption software (software doesn't decrpyt and distribute movies illegally, people do) :mad: I bet he is VERY careful not to cross the line, and he probably has a great lawyer ;)
This is one of those nuts who thinks he is for the common good, and has already won lawsuits against movie companies challenging his dvd-decryption software (software doesn't decrpyt and distribute movies illegally, people do) :mad: I bet he is VERY careful not to cross the line, and he probably has a great lawyer ;)
Apple OC
Apr 24, 12:00 AM
For what it's worth, I don't think you're an idiot.
You simply made a statement that I'm not willing to make.
I make the statement because that is how I see things ... as I said there is not even remote evidence that there are Gods or that there ever were.
Science has given me very logical and believable answers as to how life formed on Earth.
I am not one that is still searching for answers. ... some so called Atheists are hoping for the proof that there is or is not a God. ... Science has already given me all the proof I need.
You simply made a statement that I'm not willing to make.
I make the statement because that is how I see things ... as I said there is not even remote evidence that there are Gods or that there ever were.
Science has given me very logical and believable answers as to how life formed on Earth.
I am not one that is still searching for answers. ... some so called Atheists are hoping for the proof that there is or is not a God. ... Science has already given me all the proof I need.
toddybody
Apr 15, 10:53 AM
Thank goodness for people that are able to have a neutral mentality. That much is refreshing and encouraging. You all have a FABULOUS day! (I gotta go out and buy something to wear for the Lady Gaga concert tonight!) :p
Alejandro FTW!!!!!
Alejandro FTW!!!!!

justflie
Mar 18, 11:21 AM
Ok, so my comment about what don't people understand about unlimited was super snarky. Sorry.
What I meant was, If I can use 6GB (for example, I don't use this much) on my iPhone, what's the difference between that and 3GB iPhone and 3GB iPad (tethered)? If I am "entitled" to those 6GB or 4 or whatever on an unlimited plan, why does it matter how that bandwidth is distributed among my devices?
What I meant was, If I can use 6GB (for example, I don't use this much) on my iPhone, what's the difference between that and 3GB iPhone and 3GB iPad (tethered)? If I am "entitled" to those 6GB or 4 or whatever on an unlimited plan, why does it matter how that bandwidth is distributed among my devices?
Moyank24
Mar 18, 01:43 AM
Option 3; STOP trying to cheat the system, and START using your iDevice the way the manufacturer and your carrier designed it.
And while you're at it, knock off the piracy with the napster/limewire/torrent crap.
(Yeah, I said it! SOMEBODY had to!)
Do napster and limewire even exist anymore?
And while you're at it, knock off the piracy with the napster/limewire/torrent crap.
(Yeah, I said it! SOMEBODY had to!)
Do napster and limewire even exist anymore?
Apple OC
Mar 13, 11:46 AM
with all hope that things stay under control in Japan ... Nuclear power is still the way of the future.
we can learn from this disaster ... for instance future cooling generators need to be built where failure is not an option.
Things will be learned and we will be better moving forward.
we can learn from this disaster ... for instance future cooling generators need to be built where failure is not an option.
Things will be learned and we will be better moving forward.
*LTD*
Apr 9, 06:03 PM
You mean game developers are redefining it. What was the last game Apple released? Texas Hold'Em with no online multiplayer? Riiight.
It's all about the platform.
It's all about the platform.
QCassidy352
Mar 18, 11:49 AM
Wirelessly posted (Mozilla/5.0 (iPhone; U; CPU iPhone OS 4_3 like Mac OS X; en-us) AppleWebKit/533.17.9 (KHTML, like Gecko) Version/5.0.2 Mobile/8F190 Safari/6533.18.5)
I should add that I don't agree with those calling unofficial tethering "stealing." it's not taking anything from AT&T and it's not illegal in the sense of breaking a criminal law (and AT&T isn't saying otherwise). It's a violation of your contract, and AT&T is therefore justified in taking action. I agree that charging more for tethering on a limited data plan doesn't make much sense, but contracts don't have to make perfect sense.
Personally, I don't use unauthorized tethering because I believe in honoring my contracts. But it's not "stealing."
I should add that I don't agree with those calling unofficial tethering "stealing." it's not taking anything from AT&T and it's not illegal in the sense of breaking a criminal law (and AT&T isn't saying otherwise). It's a violation of your contract, and AT&T is therefore justified in taking action. I agree that charging more for tethering on a limited data plan doesn't make much sense, but contracts don't have to make perfect sense.
Personally, I don't use unauthorized tethering because I believe in honoring my contracts. But it's not "stealing."
sisyphus
Jul 12, 12:35 AM
So this'll mean one of 3 things.
1) At least 1 Mac Pro will have dual Woodcrests and the rest will have Conroes. Similar to the current PM design.
2) All the Mac Pros will have dual Woodcrests and the iMacs will be upgraded to Conroes. I find this unlikely as Steve-o doesn't like "noisy fans" and the extra heat of the Conroes and faster bus chips etc. would cause the fans to come on more often.
3) The Mac Pros will all have dual Woodcrests, the MBP & iMac will get Meroms, the MB and Mac mini will stick with the Yonahs. So what will use the Conroes? How about the Apple Mac. A simple box with a Conroe processor, a real replaceable video card, no additional PCI slots (those are reseved for the Pro models), with room for one or two full size HDs, a DVD, wireless, bluetooth, etc... This is the real machine most people have been clamouring for. A fast unhampered machine that is more than the iMac but less than the Mac Pro (as will be reflected by the price).
I've never used any of the PCI slots on my PowerMacs and don't expect that I ever will, but the ability to put any video card in is appealing. The iMac is nice and quite useful, but just slightly less than what is needed in many cases. The PowerMac has been more or less uncompromising speed and generally more than I wanted when I bought. With all of the emphasis on the name 'Mac' in the new naming scheme and a more competitive landscape now that we've gone Intel, I think (hope) this is the machine Apple will use to complete its desktop lineup.
The Apple Mac... Nice sound to it, no?
1) At least 1 Mac Pro will have dual Woodcrests and the rest will have Conroes. Similar to the current PM design.
2) All the Mac Pros will have dual Woodcrests and the iMacs will be upgraded to Conroes. I find this unlikely as Steve-o doesn't like "noisy fans" and the extra heat of the Conroes and faster bus chips etc. would cause the fans to come on more often.
3) The Mac Pros will all have dual Woodcrests, the MBP & iMac will get Meroms, the MB and Mac mini will stick with the Yonahs. So what will use the Conroes? How about the Apple Mac. A simple box with a Conroe processor, a real replaceable video card, no additional PCI slots (those are reseved for the Pro models), with room for one or two full size HDs, a DVD, wireless, bluetooth, etc... This is the real machine most people have been clamouring for. A fast unhampered machine that is more than the iMac but less than the Mac Pro (as will be reflected by the price).
I've never used any of the PCI slots on my PowerMacs and don't expect that I ever will, but the ability to put any video card in is appealing. The iMac is nice and quite useful, but just slightly less than what is needed in many cases. The PowerMac has been more or less uncompromising speed and generally more than I wanted when I bought. With all of the emphasis on the name 'Mac' in the new naming scheme and a more competitive landscape now that we've gone Intel, I think (hope) this is the machine Apple will use to complete its desktop lineup.
The Apple Mac... Nice sound to it, no?
d.perel
Mar 18, 04:01 PM
Echoing a comment I saw elsewhere, why doesn't someone just hire this guy. It probably costs more for Apple to sue each person than it would be to hire them and keep them busy fixing these problems internally.
This is one of those nuts who thinks he is for the common good, and has already won lawsuits against movie companies challenging his dvd-decryption software (software doesn't decrpyt and distribute movies illegally, people do) :mad: I bet he is VERY careful not to cross the line, and he probably has a great lawyer ;)
This is one of those nuts who thinks he is for the common good, and has already won lawsuits against movie companies challenging his dvd-decryption software (software doesn't decrpyt and distribute movies illegally, people do) :mad: I bet he is VERY careful not to cross the line, and he probably has a great lawyer ;)
Multimedia
Oct 12, 10:51 AM
Hmph... I haven't been to the Dell forums in a while or I probably wouldv'e seen that. Oh, well. Already ordered my other 30" display the other day, I'm not going to complain. :cool:Did you just get the 2007 model? If so how do you like it? Can't you lobby sales to give you the credit? You bought while the coupon was in effect - just overlooked it. It's another $96 off man. Worth asking about. Get one first then call sales.
appleguy123
Apr 22, 10:33 PM
Would it make a difference if a huge portion of what you've been exposed to, regarding religion/Christianity, was fundamentally incorrect? For example, there's no such place as hellfire; nobody is going to burn forever. Everybody isn't going to heaven; people will live right here on the earth. If you learned that a huge portion of those really crazy doctrines were simply wrong, would it cause you to view Christianity/religion differently?
I would first like to know by what standard you could call those doctrines wrong while verifying your own.
I would first like to know by what standard you could call those doctrines wrong while verifying your own.
No comments:
Post a Comment