Registar

User Tag List

Likes Likes:  0
Página 2 de 6 PrimeiroPrimeiro 1234 ... ÚltimoÚltimo
Resultados 16 a 30 de 80

Tópico: OSX Yosemite

  1. #16
    Tech Ubër-Dominus Avatar de Jorge-Vieira
    Registo
    Nov 2013
    Local
    City 17
    Posts
    30,121
    Likes (Dados)
    0
    Likes (Recebidos)
    2
    Avaliação
    1 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Apple seeds new Yosemite beta with Wi-Fi fix

    Apple has released a new beta of its OS X 10.10 Yosemite operating system, with which it hopes to get to the bottom of Wi-Fi connectivity issues plaguing its users following the upgrade.

    Released as a free follow-up to its OS X 10.9 Mavericks operating system, OS X Yosemite was not without its problems at launch. While many issues have been fixed in the post-release 10.10.1 patch, problems relating to the Wi-Fi connectivity on the company's hardware continue to plague users. Those affected report problems ranging from an inability to connect after the device has woken from sleep, connections failing to transmit or receive data and even connections being dropped entirely. While OS X 10.10.1 was supposed to address these issues, users have reported little change since its release.
    Noticia completa:
    http://www.bit-tech.net/news/bits/20...te-beta-wifi/1
    http://www.portugal-tech.pt/image.php?type=sigpic&userid=566&dateline=1384876765

  2. #17
    Tech Ubër-Dominus Avatar de Jorge-Vieira
    Registo
    Nov 2013
    Local
    City 17
    Posts
    30,121
    Likes (Dados)
    0
    Likes (Recebidos)
    2
    Avaliação
    1 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Apple Safari Update Borks OS X, Suggests Reinstalling Entire Operating System

    Apple issued an update to its Safari web browser earlier this week that was supposed to patch more than a dozen security vulnerabilities, but has now pulled it offline due to issues affecting some users. Those affected by the buggy update say that it reports installing correctly, but actually removes the browser from their system. Apple's only solution at the moment is to go nuclear and reinstall OS X.
    "Guys it seems that you have to reinstall OS X - I know it's a bummer but I am chatting live with the folks at Apple and that's what they say so far. You could also wait and see if this becomes systemic and see if Apple has a solution for it that is less drastic," a user wrote on Apple's support forum.



    The same user later updated his post claiming to have heard from support reps that there were two updates that conflicted and corrupted the Safari browser. He also posted a picture of a support email with Apple suggesting that he start over.
    "Thank you for contacting Apple Support. Based on the details you provided, we think you might find the following information helpful," the email reads. It points him to a link on how to reinstall OS X Yosemite.

    Noticia completa:
    http://hothardware.com/news/apple-sa...ryjfsudgurV.99
    http://www.portugal-tech.pt/image.php?type=sigpic&userid=566&dateline=1384876765

  3. #18
    Tech Ubër-Dominus Avatar de Jorge-Vieira
    Registo
    Nov 2013
    Local
    City 17
    Posts
    30,121
    Likes (Dados)
    0
    Likes (Recebidos)
    2
    Avaliação
    1 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Apple OS X users in the United States faced largest number of attacks

    Apple OS X users in the United States faced a large number of cyberattacks, with almost 100,000 users being targeted, according to a Kaspersky Lab report. Not surprisingly, that accounted for 39 percent of total Mac OS X cyberattacks - largely because the US has the largest number of Apple product owners - as cybercriminals pay more attention to iOS on smartphones and tablets, along with OS X on desktop computers and laptops.




    AdWare programs were the most popular method of attack against OS X users, accounting for almost half of the top 20 list, according to Kaspersky.



    Noticia completa:
    http://www.tweaktown.com/news/41899/...cks/index.html
    http://www.portugal-tech.pt/image.php?type=sigpic&userid=566&dateline=1384876765

  4. #19
    Tech Ubër-Dominus Avatar de Jorge-Vieira
    Registo
    Nov 2013
    Local
    City 17
    Posts
    30,121
    Likes (Dados)
    0
    Likes (Recebidos)
    2
    Avaliação
    1 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Angelbird SSD wrk upgraded to 1TB, continued TRIM support for Apple

    Apple's draconian move to disable TRIM software support in the latest versions of OS X has left only one third-party SSD manufacturer that supports TRIM. Angelbird natively supports TRIM in OS X, a feat others haven't been able to accomplish without TRIM Enabler software. Apple removing TRIM Enabler compatibility has forced users to expose their system to malware by disabling key security features, or to simply not use TRIM with their third-party SSDs. Other third-party SSD manufacturers rely upon garbage collection in lieu of TRIM, but as any enthusiast with rudimentary knowledge can explain, garbage collection doesn't keep performance as snappy as a TRIM-enabled system.


    Angelbird's wrk SSD now comes in capacities up to 1TB. The wrk utilizes an SMI 2246EB controller, and the case is made of a matte-black anodized aluminum. Sequential read/write speeds weigh in at 564/456 MB/s, respectively. The SSD also tops out at 72,000 random read IOPS. The 1TB wrk retails for $599.99, which is comparable to other Apple-specific SSDs, especially considering it is the only line of SSDs that natively supports an integral feature required for sustained

    Noticia:
    http://www.tweaktown.com/news/42047/...ple/index.html
    http://www.portugal-tech.pt/image.php?type=sigpic&userid=566&dateline=1384876765

  5. #20
    Tech Ubër-Dominus Avatar de Jorge-Vieira
    Registo
    Nov 2013
    Local
    City 17
    Posts
    30,121
    Likes (Dados)
    0
    Likes (Recebidos)
    2
    Avaliação
    1 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Apple Pushes Its First Automated Security Update To Squash Critical OS X NTP Flaw

    When a computer vulnerability is revealed by both the Department of Homeland Security and Carnegie Mellon University Software Engineering Institute, I'd say there's a pretty good chance that it shouldn't be ignored. Apparently, Apple agrees. Today, the Cupertino firm released its first-ever forced update, taking advantage of a mechanism first rolled-out to OS X just a couple of years ago. The software at fault is ntp, or network time protocol, which in older versions has a severe enough bug that could allow exploiters to gain control over a machine -- something that's no doubt helped by the fact that many routers don't restrict its port (123) in either direction.

    Illustration of how Network Time Protocol works
    While Apple seems to be getting the lion's share of the attention here, ntp isn't unique to OS X. In fact, this exact piece of software is also used on Linux systems. I don't personally use ntp, but I decided to check my distro's (Gentoo) repository to see if changes had been made.

    Yesterday, there were a total of 12 ntp versions available; today, there are only three, including 4.2.8-r1 and a patched 4.2.6. Looking around, I can see that some distros beat Gentoo to the punch; both Ubuntu and Arch Linux released a patched ntp on Saturday.


    Sign of ntp updates in one Linux distribution
    On either Linux or OS X, it's best to make sure you're up-to-date. If you booted up OS X today and didn't see an automatic notification at the top-right corner, I'd recommend running the updater. In Linux, you can use your package manager to see if you're running at least 4.2.8, and if you're not, but did update, you should head to Google and see whether the version you are using is in fact vulnerable. If you see a version older than 4.2.6, you should consider yourself exposed.

    At this point, Apple has no proof that any of its users have been exploited, but with a bug this severe, you sure don't want to rest on your laurels when it comes to updating.


    Noticia:
    http://hothardware.com/news/apple-pu...K7vm87teiDV.99
    Última edição de Jorge-Vieira : 23-12-14 às 21:28
    http://www.portugal-tech.pt/image.php?type=sigpic&userid=566&dateline=1384876765

  6. #21
    Tech Ubër-Dominus Avatar de Jorge-Vieira
    Registo
    Nov 2013
    Local
    City 17
    Posts
    30,121
    Likes (Dados)
    0
    Likes (Recebidos)
    2
    Avaliação
    1 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    OS X Yosemite Spotlight vulnerability allows email spammers to access IP address and private data

    Reports suggest a glitch in Apple’s OS X Yosemite is making it possible for spammers to steal IP addresses and other private data from unsuspecting users. As spotted by the German tech outlet Heise, the issue appears to be with Apple’s built-in Spotlight search and the way it treats Apple Mail results.
    The glitch was replicated successfully when tested by IDG News Service and has to do with the way Spotlight will ignore user privacy options from within Apple Mail. The company suggests users turn off “load remote content in messages" from within their Mail settings in order to avoid tracking pixels and other scams that spammers might attempt in order to steal private information.
    The problem is that when users search for something in Spotlight that brings back a Mail message of malicious nature, the remote content selection is ignored and the files are loaded up as part of the results. If a tracking pixel or something of the sort is loaded in this way, onlookers can easily pull IP addresses, system info, browser history/details and other things they shouldn’t be able to access.
    At this point, there has been no response from Apple regarding the Spotlight vulnerability, but there are things Apple Mail users can do to protect themselves in the mean time. It looks as though the best way is to simply block Spotlight from accessing Mail content manually. Go to System Preferences, then into the Spotlight options where you’ll find a list of content that will be included in results, and then uncheck the "Mail & Messages" option.
    Noticia:
    http://www.techspot.com/news/59363-o...-spammers.html
    http://www.portugal-tech.pt/image.php?type=sigpic&userid=566&dateline=1384876765

  7. #22
    Tech Ubër-Dominus Avatar de Jorge-Vieira
    Registo
    Nov 2013
    Local
    City 17
    Posts
    30,121
    Likes (Dados)
    0
    Likes (Recebidos)
    2
    Avaliação
    1 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Macs Vulnerable To Virus - not Removable

    A security researcher has discovered a way to infect Macs with malware virtually undetectable and that 'can't be removed.' The attack, which has been called Thunderstrike, installs the malicious code into the Boot ROM of the system via the Thunderbolt port.
    Trammell Hudson, who works for hedge fund Two Sigma Investments and is also the creator of the Magic Lantern open-source programming environment for Canon DSLRs, discovered the vulnerability after his employer asked him to look into the security of Apple notebooks.
    After initially discovering that the Boot ROM could be tampered with if the notebook was physically dismantled to give access to the chip soldered onto the motherboard, he then refined this technique so the attack could be carried out via the system's Thunderbolt port.
    "It turns out that the Thunderbolt port gives us a way to get code running when the system boots," Wrote Hudson. "Thunderbolt brings the PCIe bus to the outside world and at boot time the EFI firmware asks attached devices if they have any Option ROMs to be run."
    Hudson discovered that he could use a modified Apple gigabit Ethernet Thunderbolt adapter to carry out the attack.
    "Since it is the first OS X firmware bootkit, there is nothing currently scanning for its presence. It controls the system from the very first instruction, which allows it to log keystrokes, including disk encryption keys, place backdoors into the OS X kernel and bypass firmware passwords," Hudson said.
    And once it is on your system, it is incredibly hard to remove.
    "It can't be removed by software since it controls the signing keys and update routines. Reinstallation of OS X won't remove it. Replacing the SSD won't remove it since there is nothing stored on the drive."
    Fortunately, Hudson reports that Apple is working on an update that will prevent malicious code from being written to the Boot ROM via the Thunderbolt port. However, this update would not protect the system from having the Boot ROM tampered with directly.

    Noticia:
    http://www.guru3d.com/news-story/mac...removable.html
    http://www.portugal-tech.pt/image.php?type=sigpic&userid=566&dateline=1384876765

  8. #23
    Tech Ubër-Dominus Avatar de Jorge-Vieira
    Registo
    Nov 2013
    Local
    City 17
    Posts
    30,121
    Likes (Dados)
    0
    Likes (Recebidos)
    2
    Avaliação
    1 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Many of Apple's core services still aren't protected by two-factor authentication

    Apple fielded a barrage of criticism and negative press following the iCloud celebrity photo hack last fall. Although the company claimed they weren’t at fault over the debacle, Apple CEO Tim Cook vowed to broaden its use of two-factor authentication and alert users via e-mail and push notifications when someone logs into their account from a new device, restores an iCloud backup, or changes their password.
    Roughly four months later, however, two-factor authentication is still missing from several of Apple’s core applications and services.
    As blogger Dani Grant recently demonstrated, she was able to log into iTunes, FaceTime, the App Store and even Apple’s main website with nothing more than her AppleID and a password. At no point during the process was she prompted for a second form of verification despite the fact that two-factor authentication was enabled on her AppleID.
    With regard to more frequent updates, only the FaceTime login generated an alert which was sent via e-mail.
    Grant highlights the fact that, with just a password, she could impersonate someone by sending iMessages from their account, see someone’s billing address, credit card type, the last four digits of said credit card, their phone number and what app purchases someone has made.
    If Apple truly intends to broaden its use of two-factor authentication, they clearly have a lot of work left to do. And while I get that not everyone wants to put up with the “hassle” of added security, it seems that it should at least be an option for those that value their privacy.
    Noticia:
    http://www.techspot.com/news/59395-m...wo-factor.html
    http://www.portugal-tech.pt/image.php?type=sigpic&userid=566&dateline=1384876765

  9. #24
    Tech Ubër-Dominus Avatar de Jorge-Vieira
    Registo
    Nov 2013
    Local
    City 17
    Posts
    30,121
    Likes (Dados)
    0
    Likes (Recebidos)
    2
    Avaliação
    1 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Google's Project Zero reveals three Apple OS X zero-day vulnerabilities

    CNET
    Google's Project Zero security team have revealed the existence of three zero-day vulnerabilities found in Apple's OS X, following the disclosure of flaws in Microsoft's Windows operating system.
    Over the past several days, the tech giant's Project Zero scheme has released details concerning three OS X security issues the team have dubbed severe.
    The first flaw, "OS X networkd "effective_audit_token" XPC type confusion sandbox escape," which involves circumvention of commands in the network system, may be mitigated in OS X Yosemite, but there is no clear explaination of whether this is the case. The second vulnerability documents "OS X IOKit kernel code execution due to NULL pointer dereference in IntelAccelerator," and finally, the third, "OS X IOKit kernel memory corruption due to bad bzero in IOBluetoothDevice." includes an exploit related to OS X's kernel structure.
    What's Hot on ZDNet



    While each flaw requires an attacker to have access to a targeted Mac, each vulnerability could contribute to a successful attempt to elevate privilege levels and take over a machine. Each vulnerability disclosure, as with any disclosed by the Project Zero team, includes a proof-of-concept exploit.
    The vulnerabilities have been reported to Apple but the flaws have not been fixed. Once Project Zero's 90-day deadline passes, details of vulnerabilities found in systems are automatically released into the public domain.
    On Apple's product security page, the iPad and iPhone maker states:
    "For the protection of our customers, Apple does not disclose, discuss or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. Apple usually distributes information about security issues in its products through this site and [a] mailing list."
    This isn't the first time Google's Project Zero has published vulnerabilities which are yet to be fixed. In the past several weeks, the tech giant's security team has published three separate security flaws in Microsoft's Windows operating system, which were unpatched at the time.
    Noticia:
    http://www.zdnet.com/article/googles...lnerabilities/
    http://www.portugal-tech.pt/image.php?type=sigpic&userid=566&dateline=1384876765

  10. #25
    Tech Mestre
    Registo
    Feb 2013
    Posts
    6,567
    Likes (Dados)
    0
    Likes (Recebidos)
    8
    Avaliação
    3 (100%)
    Mentioned
    3 Post(s)
    Tagged
    0 Thread(s)
    A Apple anda a borrifar-se para a segurança no OS X faz muito tempo e apenas se está a ver a ponta do iceberg...

  11. #26
    Tech Ubër-Dominus Avatar de Jorge-Vieira
    Registo
    Nov 2013
    Local
    City 17
    Posts
    30,121
    Likes (Dados)
    0
    Likes (Recebidos)
    2
    Avaliação
    1 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Apple readies fix for Thunderstrike bootkit exploit in next OS X release


    A fix for the Thunderstrike proof-of-concept bootkit attack has made its way into a beta version of Apple's OS X, according to a just-published report. The new fix may indicate that a patch isn't far from general release.
    The exploit was dubbed Thunderstrike because it spreads through maliciously modified peripheral devices connected to a Mac's Thunderbolt interface. When plugged into a Mac that's booting up, the device injects what's known as an option ROM into the extensible firmware interface (EFI), the firmware responsible for starting a Mac's system management mode and enabling other low-level functions. Once a Mac is infected, the malicious firmware can survive hard drive reformats and OS reinstallations. And since Thunderstrike replaces the digital signature Apple uses to ensure only authorized firmware runs on Macs, there are few viable ways to disinfect infected systems. Earlier this month, Thunderstrike creator Trammell Hudson said that only the latest versions of Mac Mini's and iMac Retina 5ks were largely immune to the exploit but that Apple engineers were in the process of developing a fix for the rest of the Mac product line. According to a report published Friday by iMore, the patch has been spotted in the latest beta of OS X 10.10.2, the next version of Yosemite.
    "To secure against Thunderstrike, Apple had to change the code to not only prevent the Mac's boot ROM from being replaced, but also to prevent it from being rolled back to a state where the attack would be possible again," the iMore report stated. "According to people with access to the latest beta of OS X 10.10.2 who are familiar with Thunderstrike and how it works, that's exactly the deep, layered process that's been completed."
    Separately, iMore reported, the beta contains fixes for three currently unpatched OS X vulnerabilities that were recently disclosed by Google Project Zero team. The advisories were controversial because they provided proof-of-concept attack code that presented a detailed blueprint malicious hackers could use to exploit the bugs.
    On Saturday, Hudson told Ars he discussed the planned Thunderstrike fix with Apple representatives a few weeks ago while attending the Chaos Communication Congress in Germany. He went on to say that he wasn't aware it had been added to the 10.10.2 beta, and he did not yet have a chance to review the fix himself.
    "The version that I tested in Hamburg was still subject to downgrade attacks and I demonstrated it for Apple," he wrote in an e-mail. "Hopefully they have fixed that bit, although the fact that they are leaving Option ROMs enabled at all really worries me."
    Hudson said he's still waiting on the publication of CVE-2014-4498, the vulnerability designation assigned to the Thunderstrike hole.
    There are no known instances of a Thunderstrike-style attack happening in the wild, and the exploit requires the attacker to either have brief physical access to a vulnerable Mac or trick a user into plugging a booby-trapped peripheral into a Mac as it's booting up. While that's reassuring to know, there would be no way to detect a properly executed Thunderstrike attack, and exploits could feasibly be carried out by border crossing agents, hotel housekeeping staff, and anyone else who gets two or more minutes alone with a targeted machine.
    Noticia:
    http://arstechnica.com/security/2015...-os-x-release/
    http://www.portugal-tech.pt/image.php?type=sigpic&userid=566&dateline=1384876765

  12. #27
    Tech Ubër-Dominus Avatar de Jorge-Vieira
    Registo
    Nov 2013
    Local
    City 17
    Posts
    30,121
    Likes (Dados)
    0
    Likes (Recebidos)
    2
    Avaliação
    1 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    ‘Thunderstrike’ Fixed in OS X 10.10.2


    ‘Thunderstrike’, a vulnerability for Macs with a Thunderbolt port, will be patched in the next version of OS X Yosemite. The vulnerability allowed an attacker to swap a Mac’s boot firmware with software of their own via the Thunderbolt port. The new update, released to developers last week, fixes this issue.
    The flaw was deemed to be quite significant, with potential for an attacker to pretty much take whatever they wanted from a target machine. However, there have been no examples of this exploit being implemented in the wild – most probably due to the fact it would require an attacker to have physical access to the machine.
    The exploit is notable as one of the first of its kind to effect Macs, with many speculating whether the Mac platform and OS X would now be subject to more vulnerabilities like this thanks to their increased popularity.
    The update, which includes the fix, should be rolled out to end users in the coming weeks, although that may be sooner considering the urgency required to fix this flaw.
    Noticia:
    http://www.eteknix.com/thunderstrike...-os-x-10-10-2/
    http://www.portugal-tech.pt/image.php?type=sigpic&userid=566&dateline=1384876765

  13. #28
    Tech Ubër-Dominus Avatar de Jorge-Vieira
    Registo
    Nov 2013
    Local
    City 17
    Posts
    30,121
    Likes (Dados)
    0
    Likes (Recebidos)
    2
    Avaliação
    1 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    OS X 10.10.3 Seeded to Developers – Includes Highly Anticipated ‘Photos’ App


    Apple has just seeded the first beta of OS X 10.10.3 to developers, asking them test a number of tweaks and improvements, but most importantly, asking them to test the newly included Photos app – the iPhoto replacement that has apparently been heavily delayed.
    Photos is set to be the all-out replacement for iPhoto, the app Apple introduced in the early 2000s as part of its ‘digital hub’ strategy. That was the concept that the Mac would become the centre of someone’s digital life, in that you would sync your iPod, your camcorder and your camera with your Mac acting as the central hub between all of the devices.
    Of course, that isn’t the case these days, with the cloud having essentially taken that place of the hub. So Photos will essentially be the iPhoto of the cloud, tying in with Apple’s (currently in beta) iCloud Photos providing easy sync between Mac and iOS devices.
    Developers are the only ones with access so far, with registered public testers possibly getting a chance to access it soon.
    Noticia:
    http://www.eteknix.com/os-x-10-10-3-...ed-photos-app/
    http://www.portugal-tech.pt/image.php?type=sigpic&userid=566&dateline=1384876765

  14. #29
    Tech Ubër-Dominus Avatar de Jorge-Vieira
    Registo
    Nov 2013
    Local
    City 17
    Posts
    30,121
    Likes (Dados)
    0
    Likes (Recebidos)
    2
    Avaliação
    1 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Apple Forcing Users to Upgrade Flash


    In Apple’s latest hit against Adobe Flash, the most recent update to OS X is now forcing users to upgrade to new versions of Flash by blocking any web content that uses it.
    Now when a user of OS X Yosemite with an out of date Flash plugin tries to run any Flash content, they receive this message –

    Apple has had a tirade against Adobe Flash for many years, first with its decision to not include Flash on the iPhone and later and perhaps more importantly, the iPad – a decision that initially proved somewhat unpopular. Steve Jobs himself had a personal hatred towards the plugin, writing an angry open letter in 2010 titled ‘Thoughts on Flash’.
    “Symantec recently highlighted Flash for having one of the worst security records in 2009. We also know first hand that Flash is the number one reason Macs crash. We have been working with Adobe to fix these problems, but they have persisted for several years now. We don’t want to reduce the reliability and security of our iPhones, iPods and iPads by adding Flash.” - Steve Jobs
    Source: MacRumors
    Noticia:
    http://www.eteknix.com/apple-forcing...upgrade-flash/
    http://www.portugal-tech.pt/image.php?type=sigpic&userid=566&dateline=1384876765

  15. #30
    Tech Ubër-Dominus Avatar de Jorge-Vieira
    Registo
    Nov 2013
    Local
    City 17
    Posts
    30,121
    Likes (Dados)
    0
    Likes (Recebidos)
    2
    Avaliação
    1 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Parallels 10 brings Windows 10 to Mac

    You can now throw the Windows 10 Technical Preview on your Mac with the latest version of Parallels. Parallels Desktop 10 now gives Windows 10 as an option for the virtual machine, alongside Ubuntu and the older Windows 7/Windows 8.1 ISOs.
    Parallels works by creating a virtual machine on your Mac, removing the need to dual-boot with Bootcamp, although it can come with a performance hit. With Windows 10 running on Parallels you will have access to all of the new features and monthly updates as Microsoft works on improving its latest OS before release.

    The program does come with a two-week trial but after that it is going to cost you. If you don’t own a previous version of Parallels, you will have to shell out $79.99, which works out as just over £50 here in the UK.
    If you do own a previous version of the software, upgrading will cost you $39.99 or around £25 here in the UK.
    Windows 10 became available as a Technical Preview towards the end of last year. Since then Microsoft has been constantly updating with new features, the most recent of which is the Cortana Digital Assistant for desktop. Additionally, the latest versions of Microsoft Office are now available.
    Noticia:
    http://www.kitguru.net/gaming/operat...ows-10-to-mac/
    http://www.portugal-tech.pt/image.php?type=sigpic&userid=566&dateline=1384876765

 

 
Página 2 de 6 PrimeiroPrimeiro 1234 ... ÚltimoÚltimo

Informação da Thread

Users Browsing this Thread

Estão neste momento 1 users a ver esta thread. (0 membros e 1 visitantes)

Bookmarks

Regras

  • Você Não Poderá criar novos Tópicos
  • Você Não Poderá colocar Respostas
  • Você Não Poderá colocar Anexos
  • Você Não Pode Editar os seus Posts
  •