Hello,
I have a MacOS 10.5 machine (dual 1.73 GHz PowerPC G4) with a MacOS
10.4 backup drive. What would like me to look at?
On Apr 14, 2012, at 2:42 AM, Douglas Mencken wrote:
AFAIK there is no 10.4 version (I would love to be proven wrong),
and there
is no browser plugin. But it would
Hello,
I tried installing on my 10.5 PPC via MacPorts and it does not like
the CPU.
On Apr 15, 2012, at 12:08 AM, Frank J. R. Hanstick wrote:
Hello,
I have a MacOS 10.5 machine (dual 1.73 GHz PowerPC G4) with a MacOS
10.4 backup drive. What would like me to look at?
On Apr 14, 2012,
Hello,
I tried installing on my 10.5 PPC via MacPorts and it does not like
the CPU.
Ooops. Looks like they didn't provide bootstrap OpenJDK binaries for
PowerPC. And OpenJDK requires OpenJDK to be built. Chicken-and-egg
issue.
Fortunately, we do have this:
Hello,
Is there a maintainer for MacPorts JDK6 so that filing a bug report
will be responded to?
On Apr 15, 2012, at 3:23 AM, Douglas Mencken wrote:
Hello,
I tried installing on my 10.5 PPC via MacPorts and it does
not like
the CPU.
Ooops. Looks like they didn't provide
AFAIK there is no 10.4 version (I would love to be proven wrong), and there
is no browser plugin. But it would suffice for true Java apps, at least.
Correct. http://landonf.bikemonkey.org/2009/05/17
Maintainer says that
``My ability to provide 10.4 support is constrained without access to
a
On Apr 11, 7:54 am, Kris Tilford ktilfo...@cox.net wrote:
I've heard of zero people that have tested positive for this malware.
Security company sales benefit from scare tactics and over-estimation.
It does NOT affect any PPC Macs because this malware code is Intel-only.
G3-5 list is for
unclear is whether the Java exploit being used is present in older
versions of Java or not. If they are, the targeting PPC macs is
relatively simple for the bad guys. If not then PPC macs are ok.
The vulnerability *IS* present in older versions of Java.
By not releasing Java updates for Leopard and older, Apple has
screwed both ppc and x86 users.
You can get OpenJDK7 from mac ports or fink.
--
You received this message because you are a member of G-Group, a group for
those using G3, G4, and G5 desktop Macs - with a particular focus on Power
The Flashback trojan uses an exploit to break through the sandbox and execute
Java-based malware with privileges, so the *exploit will work on PPC* because
it is Java that is executing with privileges, *not* native machine code. What
is not clear is what happens next. If the binary that is
By not releasing Java updates for Leopard and older, Apple has
screwed both ppc and x86 users.
You can get OpenJDK7 from mac ports or fink.
AFAIK there is no 10.4 version (I would love to be proven wrong), and there
is no browser plugin. But it would suffice for true Java apps, at least.
Il giorno 5-04-2012 20:04, Tom ha scritto:
According to this news story on the Drudge website http://tinyurl.com/
6wgysep, half a million Apple computers are infected with malware, a
trojan disguised as a flash update
Here's an article/FAQ on CNET about it:
I've heard of zero people that have tested positive for this malware.
Security company sales benefit from scare tactics and over-estimation.
It does NOT affect any PPC Macs because this malware code is Intel-only.
G3-5 list is for PPC Macs, so let's call this thread closed.
--
You received
On Apr 8, 6:49 pm, Anne Keller-Smith earth...@ptd.net wrote:
so i'm running 10.5.8, that's leopard, does that mean i don't have the
new java
that accepts flashback?
Anne:
Not necessarily. It is possible that the original Java Runtime
(distinct from Javascript) in Leopard was upgraded to Java
so i'm running 10.5.8, that's leopard, does that mean i don't have the
new java
that accepts flashback?
i did run Malware Checker from the Apple Site that said no trojan :@D
On Apr 6, 2012, at 9:00 PM, Cameron Kaiser wrote:
Java was only used to download and execute native x86 binaries.
According to this news story on the Drudge website http://tinyurl.com/
6wgysep, half a million Apple computers are infected with malware, a
trojan disguised as a flash update, that allows other people to hijack
the computer. They don't say what OS is involved, or whether every Mac
OS is at risk.
On Apr 5, 2012, at 2:04 PM, Tom wrote:
According to this news story on the Drudge website http://
tinyurl.com/
6wgysep, half a million Apple computers are infected with malware, a
trojan disguised as a flash update, that allows other people to hijack
the computer. They don't say what OS is
They were x86 macs. No reason to worry.
--
You received this message because you are a member of G-Group, a group for
those using G3, G4, and G5 desktop Macs - with a particular focus on Power Macs.
The list FAQ is at http://lowendmac.com/lists/g-list.shtml and our netiquette
guide is at
At 1:38 PM -0400 4/6/2012, Douglas Mencken wrote:
They were x86 macs.
Yes, some were. But that's all we know. There has been no
break-down of the data, or even a release of their raw data, gathered
by that russian company.
No reason to worry.
The vulnerability exists in previous Java
On Apr 6, 2012, at 10:38 AM, Douglas Mencken wrote:
They were x86 macs. No reason to worry.
Yes reason to worry. Java's an interpreted language that gets compiled to a
universal p-code style executable; the underlying platform doesn't matter.
There are indications that older versions of Java
Java's an interpreted language that gets compiled ...
Thanks, Captain :)
There are indications that older versions of Java aren't as vulnerable, but
again, this has nothing to do with the underlying architecture.
Java was only used to download and execute native x86 binaries.
--
You
At 11:04 AM -0700 4/5/2012, Tom wrote:
According to this news story on the Drudge website http://tinyurl.com/
6wgysep, half a million Apple computers are infected with malware, a
trojan disguised as a flash update, that allows other people to hijack
the computer. They don't say what OS is
Java was only used to download and execute native x86 binaries.
Citation needed, and even if that were presently the case, that doesn't
mean they couldn't throw a Universal binary together.
--
personal: http://www.cameronkaiser.com/ --
Cameron Kaiser *
22 matches
Mail list logo