macOS Archive

Apple’s Intel Move Still Riling Mac Developers

As Apple moves from IBM's and Freescale's PowerPC RISC architecture to Intel processors, developers must rebuild their products to support both platforms, into what Apple calls a UB (Universal Binary). And while Apple lists over 1000 UB applications currently available, this process is challenging developers, especially those of some of the largest and most critical applications for the platform.

Building a Sample Core Data Application

"Core Data is a powerful data-management framework introduced with Mac OS X v10.4 Tiger. When you take advantage of Core Data, it slashes the amount of custom code you need to write in order to manage application data. Opening, saving and undo management can all be handled by Core Data, freeing you to concentrate on creating unique features for your application. This article is meant to address a somewhat different aspect of the power of this technology: the rapid development capability that is enabled by Core Data, Xcode and Interface Builder."

ObjectiveCLIPS 1.7 Released

Todd Blanchard has released version 1.7 of ObjectiveCLIPS. "ObjectiveCLIPS allows the creation of intelligent Cocoa applications with persistent object models and complex business rules. Out of the box, Apple gives you the ability to write Cocoa applications with dumb passive data models using CoreData. However, there is no convenient way to express complex constraints and dependent values without writing custom business objects. Even if you write the custom objects, your code will likely be fragile for a variety of reasons. ObjectiveCLIPS allows you to write rules about your objects and execute actions when rules match."

Ten More Things I Hate About Mac OS X

Informit.com's very own Mac Reference Guide, Owen Linzmayer, again risks the slings and arrows of Apple's most ardent admirers with another look at how Tiger rubs him wrong. Take a look at "Ten More Things I Hate About Mac OS X" to see if you recognize any of your own pet peeves. Elsewhere on the same site, this chapter covers the initial installation and setup of Mac OS X Tiger, either as a fresh installation, or as an upgrade from a previous version. Detailed instructions are given to help you set your Mac up just how you want it.

Time to Dredge up the Old Licensing Question Again

BusinessWeek explores why the chance is right for Apple to license the Mac OS to 3rd party hardware vendors. "First, the caveats: there's as much chance that Apple will license the MacOS as there is that Steve Jobs will show up to his next keynote wearing a dress instead of the usual attire. Secondly, he's probably right not to change course, because there's plenty of evidence that Apple's proprietary approach is the way to go to win the huge consumer electronics and digital media markets that are now opening up. But humor me anyway, because it's actually an interesting time to consider the question."

Mac OS X Turns 5

Exactly five years ago, 24th March 2001, Apple officially launched its new operating system, Mac OS X, the highly anticipated (and highly needed) successor to Mac OS 9. From the official press release: "Apple today announced that beginning this Saturday, March 24, customers can buy Mac OS X in retail stores around the world. Mac OS X is the world’s most advanced operating system, combining the power and openness of UNIX with the legendary ease of use and broad applications base of Macintosh."

Mac Viruses: the Hen’s Tooth of Malware

"As a long serving citizen of the Internet I have, in my time, accumulated membership to a number of email groups. It was in one of these groups that I first heard reports of a virus (Leap.A) that had started to infect Apple’s Mac OS X operating system. I was not surprised that this had happened; in fact I was quite taken aback that it had not happened before! But I was flabbergasted by the response of the Mac Mafia to this news. The assumption that something is infallible is at best naive and at worst stupid; it can only invite trouble."

Apple Issues Updated Security Fix

Apple released another version of the security patch it distributed on March 13 to users of its OS X operating system software, in order to address a problem reported with the update. The company said it distributed the new patch, dubbed Update 2006-002 v1.1, in order to fix an issue with Apple's Safari Web browser that some users observed after installing its 2006-002 security update. According to a post on the company's Web site, the previous update had caused some Safari users to have problems launching the browser.

Become An X-Coder

Learn Objective-C with Xcode in the new free PDF book from Bert Altenburg, Alex Clarke and Philippe Mougin. Jump into Cocoa Development with some ready made classes and example code for XCode 2.0 and above. The book starts from scratch with basic programming knowlegde and ends up in the depth of Objective-C and Cocoa.

Mac OS X Security Test: Results

Here are the results of the challenge launched by the Unversity of Wisconsin to test OS X against hacking. "The response has been very strong; traffic to the host spiked at over 30 Mbps. Most of the traffic, aside from casual web visitors, was web exploit scripts, ssh dictionary attacks, and scanning tools such as Nessus. The machine was under intermittent DoS attacks. During the two brief periods of denial of service, the host remained up. The test machine was a Mac mini (PowerPC) running Mac OS X 10.4.5 with Security Update 2006-001, had two local accounts, and had ssh and http open with their default configurations. There were no successful access attempts during the 38 hour duration of the test period."

Mac OS X Patch Faces Scrutiny

An Apple Computer patch released last week doesn't completely fix a high-profile Mac OS X flaw, leaving a toehold for cyberattacks, experts said. The update added a function called 'download validation' to the Safari Web browser, Apple Mail client and iChat instant messaging tool. "While Apple added a checkpoint to the downloading and execution process, they did not eliminate this vulnerability," said Kevin Long, an analyst at security specialist Cybertrust and a Mac user for 11 years. "If a user can be tricked into opening a file that looks like a picture, the user may actually be opening a malicious script."

University of Wisconsin’s Mac OS X Security Challenge

"In response to the woefully misleading ZDnet article, 'Mac OS X hacked under 30 minutes', the academic Mac OS X Security Challenge has been launched. The ZDnet article, and almost all of the coverage of it, failed to mention a very critical point: anyone who wished it was given a local account on the machine (which could be accessed via ssh). The challenge is as follows: simply alter the web page on this machine, test.doit.wisc.edu. The machine is a Mac mini (PowerPC) running Mac OS X 10.4.5 with Security Update 2006-001, has two local accounts, and has ssh and http open - a lot more than most Mac OS X machines will ever have open."

Mac OS X Hacked Under 30 Minutes

Gaining root access to a Mac is 'easy pickings', according to an individual who won an OS X hacking challenge last month by gaining root control of a machine using an unpublished security vulnerability. On February 22, a Sweden-based Mac enthusiast set his Mac Mini as a server and invited hackers to break through the computer's security and gain root control, which would allow the attacker to take charge of the computer and delete files and folders or install applications. Within hours of going live, the 'rm-my-mac' competition was over. The challenger posted this message on his Web site: "This sucks. Six hours later this poor little Mac was owned and this page got defaced".

Apple Security Fix Closes Mail, iChat, Safari Holes

Apple on Wednesday released Security Update 2006-001, available for download through Software Update system preference pane and from Apple's Downloads Web page. The update addresses a recently reported exploit that left Safari users vulnerable to malicious shell scripts, corrects a vulnerability in Apple's Mail software, and also changes the way iChat handles file transfers to help prevent the Leap-A malware.