Re: Zip problems

2006-02-18 Thread Travis Hansen
If you're sending to the same person(s) regularly, it might be useful  
for them to get StuffIt Expander for windows (free @ http:// 
www.stuffit.com/win/index.html ). I haven't used it, but I assume it  
can expand any archive made on a mac, especially stuffit files.


Hope this helps
Travis


Firewire 800 enclosure

2006-02-18 Thread Glen Low

Hi All

Any recommendations or prices for a Firewire 800 hard disk enclosure,  
to support adding 3.5 ATA drives? Preferably including USB 2.0 support.


Cheers, Glen Low


---
pixelglow software | simply brilliant stuff
www.pixelglow.com
aim: pixglen



Re: Firewire 800 enclosure

2006-02-18 Thread Daniel Kerr
On 18/02/2006 10:18 AM, Glen Low [EMAIL PROTECTED] wrote:

 Hi All
 
 Any recommendations or prices for a Firewire 800 hard disk enclosure,
 to support adding 3.5 ATA drives? Preferably including USB 2.0 support.
 
 Cheers, Glen Low
 
 
Hi Glen

The enclosures I normally sell to client with Firewire800 are either the
Sarotech range or the SOHOTank range. Both have Firewire800 and USB2 on
them.

The Sarotech is just a single silver box which the hard drive goes into
(and uses a normal kettle cable powerSupply.

The SOHOTank range is a tray type enclosure. You can choose whether it
comes with either a SATA tray or an IDE tray. The advantage with this is you
can have access to both type of hard drives, and when you fill one you can
just purchase a new tray and hot swap it out.

I use both types here and find them very good.

Email me off list if you want more info.

Hope that helps.

Kind Regards
Daniel
---
Daniel Kerr
MacWizardry

Phone: 0414 795 960
Email: danielATmacwizardryDOTcomDOTau
Web:   http://www.macwizardry.com.au


**For everything Macintosh**



Re: First self-propagating worm targeting Mac OS X

2006-02-18 Thread Daniel Kerr
This is all certainly an interesting read.
I read all the info on WAMUG, then looked a bit further a field and it's
quite interesting all the different views that are around. Some websites
agree, others go off on tangents. :o)

Was interesting to see the amount of virii out there (thanks Martin) and it
didn't take all that long for the software suppliers to fix it into their
software (both Nortons and Intego VirusBarrier X4).

It still all seems an interesting concept and something that could be
taken further if some wanted to. I guess it's a bit of a wake up call for us
to be a little more careful with files we receive and just open I suppose.
:o)

Looks like I might have to go back to installing Intego VirusBarrier again,
just incase. And seeing as the new version works with Tiger I guess I'll be
doing that soon,..hehehe.
Either that or just delete any files that come to me.hey,..I like that
option better! Might help the work load too,...a double win!

Time to lock the doors and Windows ? :o)

Enjoy!

Kind Regards
Daniel
---
Daniel Kerr
MacWizardry

Phone: 0414 795 960
Email: danielATmacwizardryDOTcomDOTau
Web:   http://www.macwizardry.com.au


**For everything Macintosh**



Re: First self-propagating worm targeting Mac OS X

2006-02-18 Thread subscribe

Hi Mart,

i Dont think this is the motherload virus the Apple community has been 
dreading, i think its alot of the same hype we have seen before with 
opener et al, as i have stated previously, it requires alot of user 
interaction for a *virus* and i hesitate to call it that., by and large 
i would expect that Apple will patch this thing pretty quickly:


as for antivius software: i like Clam AV, run it on 5 of my Servers 
here at Elproducto, it has a low overhead and is patched and updated 
regularly, i have also run it on Machines when i was at ECU, all in all 
i'm not convinced the CME-4, OSX/Leap trojan/worm/virus thing is 
anything new or anything to be overly concerned about, i would be more 
concerned that other malicious code writers will see all the hype and 
media about this thing and start to work out ways to exploit OS X, and 
during that process somebody will actually write something that is very 
dangerous and does serious damage to an OS X system.


from the ambrosia site:

You cannot be infected by this unless you do all of the following:

1) Are somehow sent (via email, iChat, etc.) or download the 
latestpics.tgz file


2) Double-click on the file to decompress it

3) Double-click on the resulting file to open it

...and then for non-Admin users, it fails to infect most applications.

You cannot simply catch the virus. Even if someone does send you the 
latestpics.tgz file, you cannot be infected unless you unarchive the 
file, and then open it.


A few important points

-- This should probably be classified as a Trojan, not a virus, because 
it doesn't self-propagate externally (though it could arguably be 
called a very non-virulent virus)


-- It does not exploit any security holes; rather it uses social 
engineering to get the user to launch it on their system


-- If you're not running as an admin user, it will silently fail to 
infect most applications


-- It doesn't actually do anything other than attempt to propagate 
itself via iChat, and then only via Bonjour! (it does not sent itself 
over the Internet, rather just to your local Bonjour user list)


-- It has a bug in the code that prevents it from working as intended, 
which has the side-effect of preventing infected applications from 
launching


-- It's not particularly sophisticated


cheers

Nat

On Feb 17, 2006, at 3:31 PM, Martin Hill wrote:

Nat, as I mentioned, I agree with some of your points (though we might 
agree
to disagree on the corruption vs destruction point!), but I think the 
main

point is that here is the first evidence of Mac OS X malware that:
- does NOT in most cases need a password to run,
- that infects (and then because of a bug corrupts) other applications
- that attempts to self-replicate using Apple-specific IM software (the
virus author also apparently planned to implement eMail propagation as 
well,

but never got around to writing that code)
and thus displays some of the features of a virus and a worm as well 
as a

trojan horse.

Whether it is terribly effective or not I think the fact remains that 
this
represents a significant new development in the small world of malware 
for
OS X.  We are now not talking about a simple trojan which lacks an 
automated

infection vector.
As such, I have finally decided to install Nortons AV on my Mac (it's 
site
licensed software here at Curtin) and realise that although the 
chances of
being infected by OS X malware is very low, the chances are now not 
zero

(particularly if you use iChat at the moment).

More to the point, proof-of-concept code such as this can be modified 
to

carry a much nastier payload down the road, so I think we need to be a
little more cautious now as Mac users - though of course we needn't be 
as

paranoid as PC users need to be.

Unfortunately we can't now brag that OS X has Zero Viruses/worms 
because it
is not really true anymore (semantic arguments notwithstanding!).  
However
we *can* brag about the 140,000 to 1 ratio of such malware when 
comparing
Windows to OS X and the fact that there are still zero recorded 
instances of
spyware and adware which all still adds up to a huge selling point for 
the

Mac.

-Mart


From: subscribe [EMAIL PROTECTED]
Date: Fri, 17 Feb 2006 14:22:51 +0800
To: WAMUG Mailing List wamug@wamug.org.au
Subject: Re: First self-propagating worm targeting Mac OS X

Mart

the only self mounting compressed files are SEA from OS9 and .dmg OS X

this only affects PPC running 10.4, it does not effect 10.3 or Core 
Duo

based machines

and it self propagates to other users in the iChat buddy list *if*  
its

shell script is executed

it does not destroy or modify anything, nor does it delete anything,
degrade performance, cause system instability or compromise any
security settings

so no i would not agree that  corrupting any application you run is
destructive

when you crash an application on OS X, is that destructive???

thats corruption, its different


cheers

Nat

On Feb 17, 2006, at 1:11 PM, 

2nd worm today (was: Re: First self-propagating worm targeting Mac OS X))

2006-02-18 Thread Martin Hill
Well what do you know - another new bit of self-propagating malware has
appeared today that self-propagates itself via Bluetooth, needs no user
assistance and targets Mac OS X 10.4:

http://news.com.com/Bluetooth+worm+targets+Mac+OS+X/2100-7349_3-6041091.html

Again, it is more a proof-of-concept and exploits an old vulnerability, but
it is a worrying development nonetheless.

Okay everyone.  I think it is time to pick your favourite Anti-virus program
and stop assuming Macs are immune.  Again, we don't need to panic as we are
still far better off than our Windows brethren, but I'm afraid we're not in
Kansas anymore Toto.

 From: subscribe [EMAIL PROTECTED]
 i Dont think this is the motherload virus the Apple community has been
 dreading, i think its alot of the same hype we have seen before with
 opener et al, as i have stated previously, it requires alot of user
 interaction for a *virus* and i hesitate to call it that.,

I would like to believe you Nat, but my investigations of this beastie point
me in the opposite direction. I've also read Andrew Welch's investigation on
the Ambrosia site and his description does make it sound like it is a large
number of hoops to jump through.  Unfortunately the very same steps can be
written as:

- Receive a message from a TRUSTED buddy in iChat
- Click accept to download the interesting looking jpeg file they have sent
- double-click the innocent looking zip file
- double-click what looks like a jpeg file

(can you seriously tell me you haven't done all these things before
yourself? Again remember that most users will NOT be asked for a password
for the script to run)

and whammo, many of your applications get infected and then corrupted and
suddenly all your local buddies have been sent the worm via iChat as well.

This is far more sophisticated than the simple trojan files which had no way
of infecting other apps or other users unless a human passed them on which
we faced with Opener et al.  Even if there are bugs in the code that stop it
from fully working a lot of the time - how long will it be before the author
or other nasty people fix the bugs and send out something worse?

 by and large 
 i would expect that Apple will patch this thing pretty quickly:

Whether Apple patches it or not is irrelevant.  Heck Microsoft patches
Windows against a lot of malware on that side of the fence all the time -
does it mean Windows users should deny that the viruses/worms/trojans exist
or that they shouldn't take appropriate measures to mitigate the problems?

This is malware of a nature we haven't faced before - we needn't be scared
of it as this current version isn't particularly nasty, but the next version
could be.   

-Mart
 
 as for antivius software: i like Clam AV, run it on 5 of my Servers
 here at Elproducto, it has a low overhead and is patched and updated
 regularly, i have also run it on Machines when i was at ECU, all in all
 i'm not convinced the CME-4, OSX/Leap trojan/worm/virus thing is
 anything new or anything to be overly concerned about, i would be more
 concerned that other malicious code writers will see all the hype and
 media about this thing and start to work out ways to exploit OS X, and
 during that process somebody will actually write something that is very
 dangerous and does serious damage to an OS X system.
 
 from the ambrosia site:
 
 You cannot be infected by this unless you do all of the following:
 
 1) Are somehow sent (via email, iChat, etc.) or download the
 latestpics.tgz file
 
 2) Double-click on the file to decompress it
 
 3) Double-click on the resulting file to open it
 
 ...and then for non-Admin users, it fails to infect most applications.
 
 You cannot simply catch the virus. Even if someone does send you the
 latestpics.tgz file, you cannot be infected unless you unarchive the
 file, and then open it.
 
 A few important points
 
 -- This should probably be classified as a Trojan, not a virus, because
 it doesn't self-propagate externally (though it could arguably be
 called a very non-virulent virus)
 
 -- It does not exploit any security holes; rather it uses social
 engineering to get the user to launch it on their system
 
 -- If you're not running as an admin user, it will silently fail to
 infect most applications
 
 -- It doesn't actually do anything other than attempt to propagate
 itself via iChat, and then only via Bonjour! (it does not sent itself
 over the Internet, rather just to your local Bonjour user list)
 
 -- It has a bug in the code that prevents it from working as intended,
 which has the side-effect of preventing infected applications from
 launching
 
 -- It's not particularly sophisticated
 
 
 cheers
 
 Nat
 
 On Feb 17, 2006, at 3:31 PM, Martin Hill wrote:
 
 Nat, as I mentioned, I agree with some of your points (though we might
 agree
 to disagree on the corruption vs destruction point!), but I think the
 main
 point is that here is the first evidence of Mac OS X malware that:
 - does NOT in most 

Re: First self-propagating worm targeting Mac OS X

2006-02-18 Thread Peter Sealy
Wow. That has to be the most repetitious email I have ever seen in  
any email list. Was it really necessary to include the earlier emails  
in full? Pity the poor folk on dialup.




On 18/02/2006, at 2:01 PM, subscribe wrote:


Hi Mart


massive snip

.

Peter Sealy
Thurgoona AUSTRALIA



Re: First self-propagating worm targeting Mac OS X

2006-02-18 Thread Martin Hill
 From: Peter Sealy [EMAIL PROTECTED]
 
 Wow. That has to be the most repetitious email I have ever seen in
 any email list. Was it really necessary to include the earlier emails
 in full? Pity the poor folk on dialup.

My apologies for my contribution to it Peter!

Luckily for dial-up users a bit of extra text in an email has a very small
effect on download speeds compared to attaching a picture for example.
Luckily the list doesn't allow that.  :-)

ciao

-Mart




Re: 2nd worm today (was: Re: First self-propagating worm targeting Mac OS X))

2006-02-18 Thread Martin Hill
 From: Martin Hill [EMAIL PROTECTED]
 Well what do you know - another new bit of self-propagating malware has
 appeared today that self-propagates itself via Bluetooth, needs no user
 assistance and targets Mac OS X 10.4:

Oops - thankfully a user does have to click accept for this worm to infect
their Mac and as I said it is more a proof-of-concept and exploits an old
vulnerability.  
Still a worrying escalation though - here's hoping it's not a sign of the
floodgates opening.

-Mart 




Re: First self-propagating worm targeting Mac OS X

2006-02-18 Thread Peter Hinchliffe


On 17/02/2006, at 9:18 AM, Martin Hill wrote:

Well it has finally happened after all these years of commentators  
crying

wolf.

The first bit of malware that attempts to spread itself to other  
Mac users
has finally arrived on the scene.  Note this is not technically a  
virus as
many articles are saying but it is also not just a simple trojan as  
some Mac

users are saying.


 Check out this article at

http://www.macworld.com/news/2006/02/17/leapafollow/index.php?lsrc=mwrss

It seems that the iChat exploit does not work over the Internet -  
only over Bonjour; and the ability to render Cocoa apps unlaunchable  
is restricted to those which are own by the user (i,e, by installed  
by drag and drop), not those which have been installed with an  
installer. It seems to have taken several hours of hard work for the  
author to get the trojan to do anything at all.


--
Peter HinchliffeApwin Computer Services
FileMaker Pro Solutions Developer
Perth, Western Australia
Phone (618) 9332 6482Fax (618) 9332 0913

Mac because I prefer it -- Windows because I have to.




re: panasonic notetaker

2006-02-18 Thread Nancy McIntyre

Hi Bill,

Manufacturers usually include a cdrom with software on it that will let 
your player get recognised on a computer.
Is there a pdf file on the cdrom?  One called  manual or 
installation instructions?  This will usually have instructions on 
how to get the machine recognised by a computer.
Is this what you've already tried with the Windows machines - 
installing the software that comes with the notetaker?


If yes, then the next step is to go to the manufacturers site and 
search for their faqs and any downloads that might have drivers for 
your notetaker.


good luck,

Nancy M



Airport for imacDV

2006-02-18 Thread Peter Martinson

Hi everyone,

My (90) year old mother has an iMacDV in her retirement residence which 
is now offering broadband via a wireless network.


I can connect to their network with my 17 Powerbook ( security is suspect).

It's a setup where they wireless to an aerial on your roof then who 
knows what.


I an seeking a retailer who sells wireless card and adapters to suit the 
iMacDV.


Google searches give so many wireless extreme that they (old cards ) are 
hard to find.


Does anyone know of any suppliers locally?

Thanks in advance.

pmarty


Re: Airport for imacDV

2006-02-18 Thread Greg Sharp
With an iMacDV I'm pretty sure that apart from the Airport Card you will
also need the Airport Adaptor Card required for this model that the Airport
card fits into. Hopefully someone local can help (I'm in Sydney) but if not
I saw both these items for sale on eBay today (can't remember when the
auction ends) that may be worth checking out.


-- 

All the best

Greg Sharp
President/Webmaster
[EMAIL PROTECTED]
Australian Mac Users Group (AUSMUG)
http://www.australian.macusersgroup.org


On 19/2/06 12:20 AM, Peter Martinson [EMAIL PROTECTED] wrote:

 Hi everyone,
 
 My (90) year old mother has an iMacDV in her retirement residence which
 is now offering broadband via a wireless network.
 
 I can connect to their network with my 17 Powerbook ( security is suspect).
 
 It's a setup where they wireless to an aerial on your roof then who
 knows what.
 
 I an seeking a retailer who sells wireless card and adapters to suit the
 iMacDV.
 
 Google searches give so many wireless extreme that they (old cards ) are
 hard to find.
 
 Does anyone know of any suppliers locally?