Please visit the new Mac-Forums Facebook page:
https://www.facebook.com/macforums1




Search:

Type: Posts; User: Cr00zng

Page 1 of 13 1 2 3 4

Search: Search took 0.01 seconds.

  1. Interesting and just some wild guesses... Did...

    Interesting and just some wild guesses...

    Did you restrict your account access to your IP address of 125.167.99.231? If not...

    The hosting company's firework and/or your forum settings blocks...
  2. Thanks Patrick... Apple support has an...

    Thanks Patrick...

    Apple support has an article, that describes the procedure:

    How to reset the System Management Controller (SMC) on your Mac - Apple Support

    The wireless connection is...
  3. Replies
    10
    Views
    891

    Yes, Jake... The bottom image is from "Device...

    Yes, Jake... The bottom image is from "Device Registration History Pre iOS8 and Yosemite."

    Keep in mind, that the data does not include third-party apps collected data as it shouldn't; that's...
  4. Replies
    10
    Views
    891

    When you insinuate that a company maybe doing...

    When you insinuate that a company maybe doing something wrong and get the collected data from them about you, the least you can do is analyze the data and share your results.

    Here's an overview...
  5. Replies
    10
    Views
    891

    @Jake... No, I don't any evidence that Apple...

    @Jake...

    No, I don't any evidence that Apple has access to that data on a routine basis, there's a difference between getting suspicious and evidence.

    You might be correct that real-time...
  6. Replies
    10
    Views
    891

    Yes, Jake, I did hear about Google's...

    Yes, Jake, I did hear about Google's Sensorvault....

    I don't use any of the Google services on my iPhone, or desktops, laptops for that matter. That includes disabling Siri's access to any of the...
  7. Replies
    10
    Views
    891

    @Ian... Let me just say, that I have no...

    @Ian...

    Let me just say, that I have no intention for doing anything wrong. My iPhone is a business device and used as such...

    The location data being sold is a privacy issue, that is...
  8. Replies
    10
    Views
    891

    iPhone location data...

    My questions relate to this article, about the wireless carriers selling GPS location data to basically anyone:

    AT&T denies that selling phone location data was illegal as FCC investigates | Ars...
  9. Thanks Guys... The procedure to replace the...

    Thanks Guys...

    The procedure to replace the Airport Card looks easy enough, I have no issues with replacing battery, HDD and now wireless card. Thanks for the link...

    The results of the...
  10. Replies
    12
    Views
    699

    That's smart Ashwin... Even if this type of...

    That's smart Ashwin... Even if this type of filtering is not set up in advance, one could filter out either the suspected purchases, financial institution notification and other important emails...
  11. WiFi card issues with MBP, late 2013...

    The model ID is MackBookPro 11,1 Wi-Fi card type Airport Extreme (0x14E4, 0x112), firmware version Broadcom BCM43xx 1.0, supported PHY mode 802.11 a/b/g/n/ac. The MacOS version is 10.14.5.

    The...
  12. Replies
    5
    Views
    2,226

    I did ask her again and she states, that she has...

    I did ask her again and she states, that she has only disabled family sharing. That did not change my Apple ID, nor should it result in an email from Apple about this change. There has been no impact...
  13. Replies
    5
    Views
    2,226

    Unintentional Apple ID change...

    This one puzzles me and I did see the post with the similar subject line, but that's not applicable in my case. With that said, here we go...

    I have my Apple ID, an ISP .net email address, set for...
  14. Replies
    16
    Views
    1,696

    I agree with you, but... In the video, the...

    I agree with you, but...

    In the video, the KeySteal app is a full blown app with GUI. What if the KeySteal code converted in to a script, with no actual notification to the end user, for remote...
  15. Replies
    16
    Views
    1,696

    My bad, the version is 10.14.3 on my macOS...

    My bad, the version is 10.14.3 on my macOS...
  16. Replies
    16
    Views
    1,696

    Well, the 10.14.4 version released on February...

    Well, the 10.14.4 version released on February 7th has addressed Face Time, CVE-2019-7286 and CVE-2019-7287 vulnerabilities, privilege escalation and arbitrary code execution respectively. Maybe it...
  17. Replies
    16
    Views
    1,696

    Keychain exploit in the wild?

    If a video of keychain exploit available on Youtube, it's pretty safe to say that it is in the wild already...


    https://www.youtube.com/watch?v=nYTBZ9iPqsU

    Is there a timeframe for Apple to...
  18. The security content of iOS 12.1.4 question...

    Apple's latest update for iOS patches three security vulnerabilities for iOS, one is Face Time bug and two of them are active attacks in the wild.

    The two attacks in the wild relied on memory...
  19. What struck me the most, how Apple downplayed the...

    What struck me the most, how Apple downplayed the impact of the flaw and not paying the bounty for the researcher.

    There's always a "security flaw" in any cloud, that may have been exploited for...
  20. Replies
    8
    Views
    542

    In order to pop up the terminal on a remote...

    In order to pop up the terminal on a remote system, one would need to login with SSH on the remote system. While it is possible that the person already hacked the system and could do this, it's very...
  21. Apple will blink, if there's a pile of cash...

    Apple will blink, if there's a pile of cash either in the form of yearly payment, looking at you Google, or monthly rentals and/or membership fees. That improves the cash-flow and I don't blame them...
  22. Other than in my post, I referenced iOS and not...

    Other than in my post, I referenced iOS and not macOS...

    While there is a "tradition" for Hackintoshes, there's no such thing as "HackiOS". The closest thing one can do is an iOS interface...
  23. While iOS for Android smartphones is possible,...

    While iOS for Android smartphones is possible, under the umbrella that anything is possible, but not without caveats...

    Both Android and iPhone use ARM CPUs, or rather SoC, with some differences....
  24. Or, one can look at this like... ...

    Or, one can look at this like...

    Alternatively, Apple admits that there isn't enough market interest for Apple TV and as such, trying to recuperate its initial investment, by extending the offer...
  25. Good bless you and wish you a long life... :Cool:...

    Good bless you and wish you a long life... :Cool:

    While I am not quite there yet, working in IT security for 20+ years, it pretty much disillusioned me about security and IT in general. Technology...
Results 1 to 25 of 318
Page 1 of 13 1 2 3 4