Re: Zip problems
If you're sending to the same person(s) regularly, it might be useful for them to get StuffIt Expander for windows (free @ http:// www.stuffit.com/win/index.html ). I haven't used it, but I assume it can expand any archive made on a mac, especially stuffit files. Hope this helps Travis
Firewire 800 enclosure
Hi All Any recommendations or prices for a Firewire 800 hard disk enclosure, to support adding 3.5 ATA drives? Preferably including USB 2.0 support. Cheers, Glen Low --- pixelglow software | simply brilliant stuff www.pixelglow.com aim: pixglen
Re: Firewire 800 enclosure
On 18/02/2006 10:18 AM, Glen Low [EMAIL PROTECTED] wrote: Hi All Any recommendations or prices for a Firewire 800 hard disk enclosure, to support adding 3.5 ATA drives? Preferably including USB 2.0 support. Cheers, Glen Low Hi Glen The enclosures I normally sell to client with Firewire800 are either the Sarotech range or the SOHOTank range. Both have Firewire800 and USB2 on them. The Sarotech is just a single silver box which the hard drive goes into (and uses a normal kettle cable powerSupply. The SOHOTank range is a tray type enclosure. You can choose whether it comes with either a SATA tray or an IDE tray. The advantage with this is you can have access to both type of hard drives, and when you fill one you can just purchase a new tray and hot swap it out. I use both types here and find them very good. Email me off list if you want more info. Hope that helps. Kind Regards Daniel --- Daniel Kerr MacWizardry Phone: 0414 795 960 Email: danielATmacwizardryDOTcomDOTau Web: http://www.macwizardry.com.au **For everything Macintosh**
Re: First self-propagating worm targeting Mac OS X
This is all certainly an interesting read. I read all the info on WAMUG, then looked a bit further a field and it's quite interesting all the different views that are around. Some websites agree, others go off on tangents. :o) Was interesting to see the amount of virii out there (thanks Martin) and it didn't take all that long for the software suppliers to fix it into their software (both Nortons and Intego VirusBarrier X4). It still all seems an interesting concept and something that could be taken further if some wanted to. I guess it's a bit of a wake up call for us to be a little more careful with files we receive and just open I suppose. :o) Looks like I might have to go back to installing Intego VirusBarrier again, just incase. And seeing as the new version works with Tiger I guess I'll be doing that soon,..hehehe. Either that or just delete any files that come to me.hey,..I like that option better! Might help the work load too,...a double win! Time to lock the doors and Windows ? :o) Enjoy! Kind Regards Daniel --- Daniel Kerr MacWizardry Phone: 0414 795 960 Email: danielATmacwizardryDOTcomDOTau Web: http://www.macwizardry.com.au **For everything Macintosh**
Re: First self-propagating worm targeting Mac OS X
Hi Mart, i Dont think this is the motherload virus the Apple community has been dreading, i think its alot of the same hype we have seen before with opener et al, as i have stated previously, it requires alot of user interaction for a *virus* and i hesitate to call it that., by and large i would expect that Apple will patch this thing pretty quickly: as for antivius software: i like Clam AV, run it on 5 of my Servers here at Elproducto, it has a low overhead and is patched and updated regularly, i have also run it on Machines when i was at ECU, all in all i'm not convinced the CME-4, OSX/Leap trojan/worm/virus thing is anything new or anything to be overly concerned about, i would be more concerned that other malicious code writers will see all the hype and media about this thing and start to work out ways to exploit OS X, and during that process somebody will actually write something that is very dangerous and does serious damage to an OS X system. from the ambrosia site: You cannot be infected by this unless you do all of the following: 1) Are somehow sent (via email, iChat, etc.) or download the latestpics.tgz file 2) Double-click on the file to decompress it 3) Double-click on the resulting file to open it ...and then for non-Admin users, it fails to infect most applications. You cannot simply catch the virus. Even if someone does send you the latestpics.tgz file, you cannot be infected unless you unarchive the file, and then open it. A few important points -- This should probably be classified as a Trojan, not a virus, because it doesn't self-propagate externally (though it could arguably be called a very non-virulent virus) -- It does not exploit any security holes; rather it uses social engineering to get the user to launch it on their system -- If you're not running as an admin user, it will silently fail to infect most applications -- It doesn't actually do anything other than attempt to propagate itself via iChat, and then only via Bonjour! (it does not sent itself over the Internet, rather just to your local Bonjour user list) -- It has a bug in the code that prevents it from working as intended, which has the side-effect of preventing infected applications from launching -- It's not particularly sophisticated cheers Nat On Feb 17, 2006, at 3:31 PM, Martin Hill wrote: Nat, as I mentioned, I agree with some of your points (though we might agree to disagree on the corruption vs destruction point!), but I think the main point is that here is the first evidence of Mac OS X malware that: - does NOT in most cases need a password to run, - that infects (and then because of a bug corrupts) other applications - that attempts to self-replicate using Apple-specific IM software (the virus author also apparently planned to implement eMail propagation as well, but never got around to writing that code) and thus displays some of the features of a virus and a worm as well as a trojan horse. Whether it is terribly effective or not I think the fact remains that this represents a significant new development in the small world of malware for OS X. We are now not talking about a simple trojan which lacks an automated infection vector. As such, I have finally decided to install Nortons AV on my Mac (it's site licensed software here at Curtin) and realise that although the chances of being infected by OS X malware is very low, the chances are now not zero (particularly if you use iChat at the moment). More to the point, proof-of-concept code such as this can be modified to carry a much nastier payload down the road, so I think we need to be a little more cautious now as Mac users - though of course we needn't be as paranoid as PC users need to be. Unfortunately we can't now brag that OS X has Zero Viruses/worms because it is not really true anymore (semantic arguments notwithstanding!). However we *can* brag about the 140,000 to 1 ratio of such malware when comparing Windows to OS X and the fact that there are still zero recorded instances of spyware and adware which all still adds up to a huge selling point for the Mac. -Mart From: subscribe [EMAIL PROTECTED] Date: Fri, 17 Feb 2006 14:22:51 +0800 To: WAMUG Mailing List wamug@wamug.org.au Subject: Re: First self-propagating worm targeting Mac OS X Mart the only self mounting compressed files are SEA from OS9 and .dmg OS X this only affects PPC running 10.4, it does not effect 10.3 or Core Duo based machines and it self propagates to other users in the iChat buddy list *if* its shell script is executed it does not destroy or modify anything, nor does it delete anything, degrade performance, cause system instability or compromise any security settings so no i would not agree that corrupting any application you run is destructive when you crash an application on OS X, is that destructive??? thats corruption, its different cheers Nat On Feb 17, 2006, at 1:11 PM,
2nd worm today (was: Re: First self-propagating worm targeting Mac OS X))
Well what do you know - another new bit of self-propagating malware has appeared today that self-propagates itself via Bluetooth, needs no user assistance and targets Mac OS X 10.4: http://news.com.com/Bluetooth+worm+targets+Mac+OS+X/2100-7349_3-6041091.html Again, it is more a proof-of-concept and exploits an old vulnerability, but it is a worrying development nonetheless. Okay everyone. I think it is time to pick your favourite Anti-virus program and stop assuming Macs are immune. Again, we don't need to panic as we are still far better off than our Windows brethren, but I'm afraid we're not in Kansas anymore Toto. From: subscribe [EMAIL PROTECTED] i Dont think this is the motherload virus the Apple community has been dreading, i think its alot of the same hype we have seen before with opener et al, as i have stated previously, it requires alot of user interaction for a *virus* and i hesitate to call it that., I would like to believe you Nat, but my investigations of this beastie point me in the opposite direction. I've also read Andrew Welch's investigation on the Ambrosia site and his description does make it sound like it is a large number of hoops to jump through. Unfortunately the very same steps can be written as: - Receive a message from a TRUSTED buddy in iChat - Click accept to download the interesting looking jpeg file they have sent - double-click the innocent looking zip file - double-click what looks like a jpeg file (can you seriously tell me you haven't done all these things before yourself? Again remember that most users will NOT be asked for a password for the script to run) and whammo, many of your applications get infected and then corrupted and suddenly all your local buddies have been sent the worm via iChat as well. This is far more sophisticated than the simple trojan files which had no way of infecting other apps or other users unless a human passed them on which we faced with Opener et al. Even if there are bugs in the code that stop it from fully working a lot of the time - how long will it be before the author or other nasty people fix the bugs and send out something worse? by and large i would expect that Apple will patch this thing pretty quickly: Whether Apple patches it or not is irrelevant. Heck Microsoft patches Windows against a lot of malware on that side of the fence all the time - does it mean Windows users should deny that the viruses/worms/trojans exist or that they shouldn't take appropriate measures to mitigate the problems? This is malware of a nature we haven't faced before - we needn't be scared of it as this current version isn't particularly nasty, but the next version could be. -Mart as for antivius software: i like Clam AV, run it on 5 of my Servers here at Elproducto, it has a low overhead and is patched and updated regularly, i have also run it on Machines when i was at ECU, all in all i'm not convinced the CME-4, OSX/Leap trojan/worm/virus thing is anything new or anything to be overly concerned about, i would be more concerned that other malicious code writers will see all the hype and media about this thing and start to work out ways to exploit OS X, and during that process somebody will actually write something that is very dangerous and does serious damage to an OS X system. from the ambrosia site: You cannot be infected by this unless you do all of the following: 1) Are somehow sent (via email, iChat, etc.) or download the latestpics.tgz file 2) Double-click on the file to decompress it 3) Double-click on the resulting file to open it ...and then for non-Admin users, it fails to infect most applications. You cannot simply catch the virus. Even if someone does send you the latestpics.tgz file, you cannot be infected unless you unarchive the file, and then open it. A few important points -- This should probably be classified as a Trojan, not a virus, because it doesn't self-propagate externally (though it could arguably be called a very non-virulent virus) -- It does not exploit any security holes; rather it uses social engineering to get the user to launch it on their system -- If you're not running as an admin user, it will silently fail to infect most applications -- It doesn't actually do anything other than attempt to propagate itself via iChat, and then only via Bonjour! (it does not sent itself over the Internet, rather just to your local Bonjour user list) -- It has a bug in the code that prevents it from working as intended, which has the side-effect of preventing infected applications from launching -- It's not particularly sophisticated cheers Nat On Feb 17, 2006, at 3:31 PM, Martin Hill wrote: Nat, as I mentioned, I agree with some of your points (though we might agree to disagree on the corruption vs destruction point!), but I think the main point is that here is the first evidence of Mac OS X malware that: - does NOT in most
Re: First self-propagating worm targeting Mac OS X
Wow. That has to be the most repetitious email I have ever seen in any email list. Was it really necessary to include the earlier emails in full? Pity the poor folk on dialup. On 18/02/2006, at 2:01 PM, subscribe wrote: Hi Mart massive snip . Peter Sealy Thurgoona AUSTRALIA
Re: First self-propagating worm targeting Mac OS X
From: Peter Sealy [EMAIL PROTECTED] Wow. That has to be the most repetitious email I have ever seen in any email list. Was it really necessary to include the earlier emails in full? Pity the poor folk on dialup. My apologies for my contribution to it Peter! Luckily for dial-up users a bit of extra text in an email has a very small effect on download speeds compared to attaching a picture for example. Luckily the list doesn't allow that. :-) ciao -Mart
Re: 2nd worm today (was: Re: First self-propagating worm targeting Mac OS X))
From: Martin Hill [EMAIL PROTECTED] Well what do you know - another new bit of self-propagating malware has appeared today that self-propagates itself via Bluetooth, needs no user assistance and targets Mac OS X 10.4: Oops - thankfully a user does have to click accept for this worm to infect their Mac and as I said it is more a proof-of-concept and exploits an old vulnerability. Still a worrying escalation though - here's hoping it's not a sign of the floodgates opening. -Mart
Re: First self-propagating worm targeting Mac OS X
On 17/02/2006, at 9:18 AM, Martin Hill wrote: Well it has finally happened after all these years of commentators crying wolf. The first bit of malware that attempts to spread itself to other Mac users has finally arrived on the scene. Note this is not technically a virus as many articles are saying but it is also not just a simple trojan as some Mac users are saying. Check out this article at http://www.macworld.com/news/2006/02/17/leapafollow/index.php?lsrc=mwrss It seems that the iChat exploit does not work over the Internet - only over Bonjour; and the ability to render Cocoa apps unlaunchable is restricted to those which are own by the user (i,e, by installed by drag and drop), not those which have been installed with an installer. It seems to have taken several hours of hard work for the author to get the trojan to do anything at all. -- Peter HinchliffeApwin Computer Services FileMaker Pro Solutions Developer Perth, Western Australia Phone (618) 9332 6482Fax (618) 9332 0913 Mac because I prefer it -- Windows because I have to.
re: panasonic notetaker
Hi Bill, Manufacturers usually include a cdrom with software on it that will let your player get recognised on a computer. Is there a pdf file on the cdrom? One called manual or installation instructions? This will usually have instructions on how to get the machine recognised by a computer. Is this what you've already tried with the Windows machines - installing the software that comes with the notetaker? If yes, then the next step is to go to the manufacturers site and search for their faqs and any downloads that might have drivers for your notetaker. good luck, Nancy M
Airport for imacDV
Hi everyone, My (90) year old mother has an iMacDV in her retirement residence which is now offering broadband via a wireless network. I can connect to their network with my 17 Powerbook ( security is suspect). It's a setup where they wireless to an aerial on your roof then who knows what. I an seeking a retailer who sells wireless card and adapters to suit the iMacDV. Google searches give so many wireless extreme that they (old cards ) are hard to find. Does anyone know of any suppliers locally? Thanks in advance. pmarty
Re: Airport for imacDV
With an iMacDV I'm pretty sure that apart from the Airport Card you will also need the Airport Adaptor Card required for this model that the Airport card fits into. Hopefully someone local can help (I'm in Sydney) but if not I saw both these items for sale on eBay today (can't remember when the auction ends) that may be worth checking out. -- All the best Greg Sharp President/Webmaster [EMAIL PROTECTED] Australian Mac Users Group (AUSMUG) http://www.australian.macusersgroup.org On 19/2/06 12:20 AM, Peter Martinson [EMAIL PROTECTED] wrote: Hi everyone, My (90) year old mother has an iMacDV in her retirement residence which is now offering broadband via a wireless network. I can connect to their network with my 17 Powerbook ( security is suspect). It's a setup where they wireless to an aerial on your roof then who knows what. I an seeking a retailer who sells wireless card and adapters to suit the iMacDV. Google searches give so many wireless extreme that they (old cards ) are hard to find. Does anyone know of any suppliers locally?