Registar

User Tag List

Likes Likes:  0
Página 3 de 6 PrimeiroPrimeiro 12345 ... ÚltimoÚltimo
Resultados 31 a 45 de 80

Tópico: OSX Yosemite

  1. #31
    Tech Ubër-Dominus Avatar de Jorge-Vieira
    Registo
    Nov 2013
    Local
    City 17
    Posts
    30,121
    Likes (Dados)
    0
    Likes (Recebidos)
    2
    Avaliação
    1 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Windows And Linux More Secure? Mac OS X And iOS Top List Of Most Vulnerable Operating Systems

    Conventional wisdom in years past was that hackers didn’t bother to exploit Apple’s OS X operating system because its relatively insignificant market share didn’t warrant wasting resources to exploit it. The reasoning was, why bother with OS X when Windows was pushing over 90 percent of the worldwide OS market?

    However, in recent years, Apple has seen an uptick in Mac sales and pretty much dominates the field when it comes to notebooks priced over $1,000. The higher sales profile for Macs running OS X also means more attention from nefarious parties that are ready to strike. The latest report from GFI shows that both of Apple’s major operating systems sat atop the leaderboard when it came to security vulnerabilities during 2014.
    According to GFI, OS X took top honors with 147 vulnerabilities, 64 of which were labeled as “high risk”. iOS took the number two position with 127 vulnerabilities, 32 of which were high risk. Rounding out the top three was the Linux kernel, with 119 total vulnerabilities including 24 high risk.

    In total, there were 7,038 new security vulnerabilities reported during 2014 according to GDI, which was a marked increase from 4,794 the previous year. Of those 7,038 vulnerabilities, a total of 24 percent were high risk.
    “2014 was a tough year for Linux users from a security point of view, coupled with the fact that some of the most important security issues of the year were reported for applications that usually run on Linux systems,” said GDI’s Christian Florian. “Heartbleed, for example, is a critical security vulnerability detected in OpenSSL while Shellshock is a vulnerability that affects GNU Bash.”

    We have some questions/reservations about GDI’s numbers, and it relates to how the operating system vulnerabilities are being reported (we’ve reached out to GDI for clarification). First off, it appears that all versions of OS X (Lion, Mountain Lion, Mavericks, Yosemite, etc.) are lumped together under a single “OS X” line entry. However, all major Windows versions (Windows 7, Windows 8, Windows 8.1, Windows Vista, etc.) are given their own separate line entries. It’s possible that this was done because there is a lot of duplication among Windows versions when it comes to vulnerabilities (the number of total, high, medium, and low vulnerabilities among all Windows operating systems is remarkably similar). Regardless, it would be nice to have seen similar metrics used for all operating systems.
    On a second note, Android has always been a very popular target for hackers but it’s not specifically called out in this study. Android is likely being lumped in with all Linux kernel operating systems, but again, it would be nice to see some distinctions made here to make a more reasoned comparison between platforms.
    When it comes to applications, Microsoft’s Internet Explorer led the list with 242 total vulnerabilities, nearly twice that of the next closest entry, Google Chrome, with 124 total vulnerabilities. The number of high risk vulnerabilities was also troubling for Microsoft, as 220 were reported versus Google Chrome’s 86.

    Adobe Flash Player, always a headline maker when it comes to security vulnerabilities, surprisingly came in “only” fourth place (76 total vulnerabilities) behind Mozilla Firefox (117 total vulnerabilities).
    In light of all the hoopla surrounding Lenovo and the Superfish adware, we all should remain vigilant when it comes to computer security, regardless of what platform we use. GFI suggests common sense steps to protect yourself including keeping your operating system, Internet browsers, and Java software fully patched. GFI also wisely suggests that Internet users simply ditch Adobe products like Flash Player and Reader altogether to avoid becoming the victim of malicious hackers.


    Noticia:
    http://hothardware.com/news/windows-...1ykLIrjO34v.99
    http://www.portugal-tech.pt/image.php?type=sigpic&userid=566&dateline=1384876765

  2. #32
    Tech Ubër-Dominus Avatar de Jorge-Vieira
    Registo
    Nov 2013
    Local
    City 17
    Posts
    30,121
    Likes (Dados)
    0
    Likes (Recebidos)
    2
    Avaliação
    1 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Old Security Flaw Leaves Apple And Android Users Vulnerable

    How does stuff like this happen? Seriously, a security flaw from the 1990s?


    A team of cryptographers have discovered that a security flaw from way back in the '90s still leaves users today vulnerable to cyberattacks. They've dubbed it "Factoring attack on RSA-EXPORT Key" or FREAK, and it renders everyone who uses Safari on Mac and iOS devices or Android's stock browser susceptible to hacking when they visit certain "secure" websites.
    Noticia:
    http://www.hardocp.com/news/2015/03/...e#.VPc-heFv7P4
    http://www.portugal-tech.pt/image.php?type=sigpic&userid=566&dateline=1384876765

  3. #33
    Tech Ubër-Dominus Avatar de Jorge-Vieira
    Registo
    Nov 2013
    Local
    City 17
    Posts
    30,121
    Likes (Dados)
    0
    Likes (Recebidos)
    2
    Avaliação
    1 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Bite My Shiny Metal Ask: Java for OS X Crapware

    The divide between PC and Mac just shrunk a little bit more now that Oracle treats them as equals. What once was strictly the domain of the PC is now plaguing the Mac as well. The Java Plugin for OSX now installs the dreaded Ask.com homepage and search engine by default.


    Those who don't pay close attention when installing, however, will get the (potentially) unwanted Askware and a homepage takeover with their Java update.
    Noticia:
    http://www.hardocp.com/news/2015/03/...e#.VPxlHOFv7P4
    http://www.portugal-tech.pt/image.php?type=sigpic&userid=566&dateline=1384876765

  4. #34
    Tech Ubër-Dominus Avatar de Jorge-Vieira
    Registo
    Nov 2013
    Local
    City 17
    Posts
    30,121
    Likes (Dados)
    0
    Likes (Recebidos)
    2
    Avaliação
    1 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Apple Seeds OS X 10.10.3 Yosemite Beta 7 to Developers


    Apple has just seeded the seventh OS X 10.10.3 Yosemite beta to registered testers and developers. This comes only three days after the sixth OS X 10.10.3 Yosemite was seeded to beta testers. The latest OS X 10.10.3 14D130a build brings stability and security improvements and weighs around 1.52 GB in size.

    OS X 10.10.3 beta 7:

    The first OS X 10.10.3 beta version was seeded out some two months back. The following updates have revealed some new features including the new iPhoto app, redesigned emoji screen, new emoji skin modifiers and more. The focus on emoji also include an immense diversity in color tones of people and 32 new country flags have been added too including India among others.



    Apart from an all new Photos app, the latest Yosemite beta also adds support for two-factor authentication and new APIs for Force Touch display functionality. The Force Touch APIs are for the new 12-inch MacBook and 13-inch Retina MacBook Pro.
    Today, Apple has seeded the seventh OS X 10.10.3 Yosemite beta build number 14D130a to public beta testers and registered developers. If you are registered with Apple, you can access the OS X 10.10.3 beta 7 via Mac App Store or Developer Center.
    Considering Apple’s promise of OS X Yosemite 10.10.3 public coming in Spring, it seems we will soon be seeing the public release as March is already over. Fingers crossed.
    Relevant news and updates:





    http://www.portugal-tech.pt/image.php?type=sigpic&userid=566&dateline=1384876765

  5. #35
    Tech Ubër-Dominus Avatar de Jorge-Vieira
    Registo
    Nov 2013
    Local
    City 17
    Posts
    30,121
    Likes (Dados)
    0
    Likes (Recebidos)
    2
    Avaliação
    1 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    OS X Yosemite update finally drops iPhoto

    Back in February, we learned that Apple was finally working towards ditching iPhoto, along with Aperture, with a new ‘Photos’ app for the latest version of OS X, ‘Yosemite’. Now the time has finally come and the new app has been pushed out in an update.
    The developer version of the new photos application has actually been available for some time, adding in a more intuitive interface, with a similar look to the iOS photos app. Now the latest OS X Yosemite update has dropped iPhoto in favour of the new photos app.

    Much like on the iOS photos app, the desktop variant will organize images in to ‘moments, collections and years’. Any edits made to your photos will also sync to those stored on your other Apple devices, like the iPhone and iPad.
    The photos app comes with iCloud support built-in, allowing all of your images to be backed up in the cloud, although those who take a lot of pictures will probably run out of space pretty quick and will need to pay a monthly fee for additional storage.
    Noticia:
    http://www.kitguru.net/apple/matthew...-drops-iphoto/
    http://www.portugal-tech.pt/image.php?type=sigpic&userid=566&dateline=1384876765

  6. #36
    Tech Ubër-Dominus Avatar de Jorge-Vieira
    Registo
    Nov 2013
    Local
    City 17
    Posts
    30,121
    Likes (Dados)
    0
    Likes (Recebidos)
    2
    Avaliação
    1 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Apple turns huge security bug into money making feature



    Upgrade or die

    We have hassled fruity cargo cult Apple for being slower than an asthmatic ant with a heavy load of shopping when it came to security updates, so it is jolly nice when the outfit actually thinks of its users and updates something.


    Apple has announced that it found a serious security flaw in OS X and said it had fixed it. However it seems that Apple's love has not extended to customers who do not rush out and buy the latest hardware and run its latest software.
    If you aren't running Yosemite, which was updated yesterday with the relevant patch, then Apple does not think you are worth bothering about.
    The flaw enables nefarious types to get root access to your system by exploiting a backdoor in the system preferences app. Any hacker to make themselves the administrator of your Appleware and can listen to your Coldplay collection and steal all your porn.
    Apple said it will not make the fix work for Mavericks and Mountain Lion users because of the "complexity of the fix."
    Besides if you were a real Apple customer you would bankrupt yourself to upgrade your hardware and software every time Apple tells you. It is only Microsoft users who expect security updates on ancient hardware.
    The flaw was discovered by security researcher Emil Kvarnhammar at TrueSec in October, but has actually existed since at least 2011.
    Of course the Tame Apple Press® are not blasting Apple for treating its customers badly – instead it is saying that you should upgrade to the newest version of OS X – because it is free.
    Of course if your Appleware is too old to take the new OS then you will have to buy some new hardware. So Apple is using its own security flaws to drive users to buying new gear. Still you get what you pay for.
    Noticia:
    http://www.fudzilla.com/news/37510-a...making-feature
    http://www.portugal-tech.pt/image.php?type=sigpic&userid=566&dateline=1384876765

  7. #37
    Tech Ubër-Dominus Avatar de Jorge-Vieira
    Registo
    Nov 2013
    Local
    City 17
    Posts
    30,121
    Likes (Dados)
    0
    Likes (Recebidos)
    2
    Avaliação
    1 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Why You Need to Update to OS X 10.10.3 Now


    Updates to your operating system aren't just to get cool new features. In fact, their primary raison d'être is to provide vital security updates that patch holes and vulnerabilities. Such is the case with Mac OS X 10.10.3, which fixes a potentially devastating flaw, but only for OS X Yosemite users.
    Emil Kvarnhammar, writing for Swedish security firm TrueSec's blog, explained that he discovered a nasty vulnerability known as Rootpipe back in October 2014. It took Apple six months, but the manufacturer did finally issue a patch in its most recent security update. The only trouble is that not everyone will receive it.
    MORE: Apple's New 12-inch Retina MacBook Reviewed
    As Kvarnhammar points out, Mac OS X 10.9.x and older will not receive the patch, necessitating an update to 10.10.3 as soon as possible. To be clear, this means that if you are running OS X Mavericks, Mountain Lion, Lion or Snow Leopard, you are missing out on a very important security update.
    Rootpipe is a hack developed by Kvarnhammar himself that takes advantage of a backdoor in Apple's application program interface. Basically, it takes advantage of a hole in a Mac operating system's code, then escalates privilege so that any user can pretend to be an administrator. From there, hijacking the computer is child's play, as is installing all manner of spyware or malware.
    One important thing to keep in mind is that Kvarnhammar is a researcher, and Rootpipe is a proof-of-concept. There is no evidence that hackers are currently taking advantage of this exploit in the wild.
    However, Kvarnhammar shared some details about the process in his blog post, and will give a whole talk about it at Security Conference 2015 in Stockholm on May 28. After that, an enterprising malefactor could probably piece together a similar program.
    Many Mac users are hesitant to upgrade to Yosemite because it has the potential to slow down older systems (most Macs from 2007 or later are eligible for a free upgrade), perhaps necessitating the purchase of an expensive new machine. We leave it to you to weigh a nasty security risk against a machine that runs at peak efficiency, and decide which is more important.
    For instructions on how to upgrade, check Apple Support.

    Noticia:
    http://www.tomsguide.com/us/update-o...ews-20762.html
    http://www.portugal-tech.pt/image.php?type=sigpic&userid=566&dateline=1384876765

  8. #38
    Tech Ubër-Dominus Avatar de Jorge-Vieira
    Registo
    Nov 2013
    Local
    City 17
    Posts
    30,121
    Likes (Dados)
    0
    Likes (Recebidos)
    2
    Avaliação
    1 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Apple fails to fix back-door API in OS X 10.10.3





    A security researcher has claimed Apple's recently-released fix for the Rootpipe backdoor, bundled in OS X 10.10.3, fails to resolve the underlying issue - leaving all OS X systems still vulnerable to attack.


    The Rootpipe flaw was first disclosed by security searcher Emil Kvarnhammar, who released public details earlier this month following the release of OS X 10.10.3 with a patch for the flaw. Versions of OS X prior to 10.10.3, Kvarnhammar explained, feature a back-door application programming interface (API) designed to make management of the system easier for non-technical users - but, unfortunately, allowing trivial privilege escalation by any program running on the system to gain administrator-level access permissions.

    Known to affect OS X versions going back to at least 2011 and potentially considerably earlier, Apple worked on a patch after being alerted to the problem by Kvarnhammar back in October last year. OS X 10.10.2 was supposed to fix the flaw but didn't, and now it's being claimed that 10.10.3 fails to do the job as well.

    Security researcher Patrick Wardle has published evidence that Rootpipe is still exploitable on a fully-patched OS X 10.10.3 installation, dubbing his 'novel, yet trivial' modification to Kvarnhammar's work Pheonix. 'I[n] the spirit of responsible disclosure, (at this time), I won't be providing the technical details of the attack (besides of course to Apple),' Wardle wrote above a video demonstration of the attack. 'However, I felt that in the meantime, OS X users should be aware of the risk.'

    Apple has not publicly responded to Wardle's claims of continued vulnerability.
    Noticia:
    http://www.bit-tech.net/news/bits/20...pipe-pheonix/1
    http://www.portugal-tech.pt/image.php?type=sigpic&userid=566&dateline=1384876765

  9. #39
    Tech Ubër-Dominus Avatar de Jorge-Vieira
    Registo
    Nov 2013
    Local
    City 17
    Posts
    30,121
    Likes (Dados)
    0
    Likes (Recebidos)
    2
    Avaliação
    1 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Apple 'Rootpipe' security vulnerability still prevalent following patch, researchers claim




    Apple issued an OS X Yosemite update earlier this month which remedied a flaw known as Rootpipe. First discovered last October by security researcher Emil Kvarnhammar (yet having existed since at least 2011), the flaw allows bad actors to gain root access to a system through a backdoor in the system preferences app.
    A second security researcher, Patrick Wardle, attempted to exploit the vulnerability on a patched machine and was apparently able to pull it off.
    In a post on Objective-See, Wardle said he was on a return flight from a conference when he stumbled upon what he describes as a novel, yet trivial way for any local user to re-abuse Rootpipe. Wardle didn’t provide the technical details of the attack in the spirit of responsible disclosure (except to Apple, of course) but wanted other OS X users to be aware of the risk.
    In an e-mailed statement to Forbes, Wardle said he was tempted to walk into an Apple store and try the exploit on a display model but stuck to testing it on his personal laptop.
    Wardle, currently the director of research and development at security firm Synack, has made a name for himself in the security community by presenting at conferences including DefCon, VirusBulletin, ShmooCon and CanSecW.
    Apple could have its hands full with Rootpipe. Another security researcher, Pedro Vilaça, told the publication that the original fix was doomed since its release because there are so many ways to bypass it “due to the wrong fix design.”
    Apple has also been criticized for only issuing a patch for OS X Yosemite, effectively leaving a large number of Mac users vulnerable.
    Noticia:
    http://www.techspot.com/news/60443-a...searchers.html
    http://www.portugal-tech.pt/image.php?type=sigpic&userid=566&dateline=1384876765

  10. #40
    Tech Ubër-Dominus Avatar de Jorge-Vieira
    Registo
    Nov 2013
    Local
    City 17
    Posts
    30,121
    Likes (Dados)
    0
    Likes (Recebidos)
    2
    Avaliação
    1 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Researcher claims that attackers can easily bypass current OSX security tools


    Most Mac users feel as though they are impenetrable to viruses and malicious software, but according to one researcher that is not the case. While Apple has its fair share if security measures in place, recent data has surfaced suggesting those tools are “trivial” for any attacker to bypass. For sometime, most people believed that owning a Mac was a safe choice, and that only Windows users could get hacked. However, researcher Patrick Wardle doesn’t seem to think so.
    During a talk at the RSA Conference recently, Wardle explained the security measures on OSX are actually full of holes, if a competent hacker chose to exploit them. First up, he said that GateKeeper, Apple’s app verifier, doesn’t check extra content in apps, but rather only the app bundle itself. Meaning that attackers could load a verified app with dangerous extra content and it could, according to Wardle, slide right through Apple’s security.
    The researcher went on to say that Apple’s sandbox technology on OSX is quite strong in terms of security, but there were a number of bugs that can be used to bypass it. On top of what Wardle called a“trivial to bypass” anti-malware system, he also found issues with code signing:
    The code signing just checks for a signature and if it’s not there, it doesn’t do anything and lets the app run. I can unsign a signed app and the loader has no way to stop it from running.
    It’s hard to imagine, with that many security flaws, that we haven’t seen mass hysteria break out among the Mac crowd. But it is clear that Apple should be looking into these holes, as it is likely only a matter of time before serious issues start to arise.
    Noticia:
    http://www.techspot.com/news/60479-r...rrent-osx.html
    http://www.portugal-tech.pt/image.php?type=sigpic&userid=566&dateline=1384876765

  11. #41
    Tech Ubër-Dominus Avatar de Jorge-Vieira
    Registo
    Nov 2013
    Local
    City 17
    Posts
    30,121
    Likes (Dados)
    0
    Likes (Recebidos)
    2
    Avaliação
    1 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Major security flaw spotted on Macs released before 2014


    A security bug has been spotted over the weekend that may leave older Apple computers vulnerable. To some, the Mac is impenetrable to viruses and other malicious software, but the rest of us know that's not true as it looks like another security hole has been overlooked by Cupertino.
    Pedro Vilaca, a researcher specializing in OS X, says the zero-day vulnerability allows attackers to stealthily drop rootlkit malware on to Macs. This can be very hard to remove and near impossible to detect, according to reports. Apple computers have a unified extensible firmware interface (UEFI) that is normally blocked off from attacks, but Vilaca claims it’s open season once the target Mac has been put to sleep and reawakened.
    Unlike similar vulnerabilities that have been spotted, this one can apparently be triggered remotely. It is a good idea to never allow you computer to sleep or to just shut it down when it’s not in use if this bug worries you. That is, at least until Apple deals with it.
    Vilaca was able to undermine the security of a MacBook Pro, an older MacBook and a MacBook Air (made previous to 2014) using the zero-day UEFI attack described above.
    The security hole only appears on machines release before 2014, which could suggest that Apple already knows about the bug, fixed it and left older machines in the dust. Cupertino is yet to make an official statement on the matter.
    Noticia:
    http://www.techspot.com/news/60854-m...fore-2014.html
    http://www.portugal-tech.pt/image.php?type=sigpic&userid=566&dateline=1384876765

  12. #42
    Tech Ubër-Dominus Avatar de Jorge-Vieira
    Registo
    Nov 2013
    Local
    City 17
    Posts
    30,121
    Likes (Dados)
    0
    Likes (Recebidos)
    2
    Avaliação
    1 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    New Mac Exploit Leaves Users Dangerously Vulnerable To Remote Access

    Apple’s operating systems, justifying their closed state nature through claims of better security do end up faring better than other when it comes to viruses and vulnerabilities. While vulnerabilities in Apple operating systems, OS or iOS are not that common, they do occur, and more often then not end up having serious repercussions. Another such vulnerability has been discovered by researcher Pedro Vilaca and it can enable a hacker to take complete control of your Mac.


    Mac Vulnerability Can Allow Remote Attackers To Remotely Control Your Computer

    All Macs shipped before the second half of 2014 are vulnerable to an all new BIOS exploit discovered by researcher Pedro Vilaca. Through using vulnerabilities already present in web browsers, attackers can install malicious code on Macs, that will not be removed whether you format your hard drive or reinstall your operating system. Not only will this exploit end up giving an attacker low level control of your Mac, but unlike last year’s Thunderstrike vulnerability, it doesn’t require an attacker to physically access your Mac either.
    Attackers in any part of the world will be able to remotely take control of your Mac and wreak havoc. The vulnerability works when your Mac’s FLOCKDN protection, which prevents write access to BIOS data is deactivated one the device wakes up from sleep mode. This allows attackers to modify its EFI interface and make changes to the machine’s code. “The bug can be used with a Safari or other remote vector to install an EFI rootkit without physical access,” writes Vilaca. “The only requirement is that a suspended happened, in the current session. I haven’t researched but you could probably force the suspend and trigger this, all remotely. That’s pretty epic ownage ;-).”





    Vilaca also doesn’t believe that the attack can be used to exploit devices on a large scale. Rather, the researcher believes that attacks can be carried out against high value targets. What can you do to prevent such attacks? Nothing that a regular, average Joe can carry out. But, if you know your way around Macs, or know someone who does, you can install software released by Thunderstrike’s creator. Follow this and this for the software. While it won’t protect you from the attack, it will let you know if such an attack has occurred, which is better than doing nothing.
    So that’s it folks. While we’ve contacted Apple for an official response on the situation, a reply from the Cupertino manufacturer is highly unlikely, given that Apple doesn’t reply until such vulnerabilities have been taken care of. But given the fact that Mac shipping before mid-2014 are affected, has the Cupertino manufacturer already taken care of matters beforehand? We’ll find out soon enough. Stay tuned and let us know what you think in the comments section.




    http://www.portugal-tech.pt/image.php?type=sigpic&userid=566&dateline=1384876765

  13. #43
    Tech Mestre
    Registo
    Feb 2013
    Posts
    6,567
    Likes (Dados)
    0
    Likes (Recebidos)
    8
    Avaliação
    3 (100%)
    Mentioned
    3 Post(s)
    Tagged
    0 Thread(s)
    O pior é que a Apple não se dá ao trabalho de proteger o seu sistema operativo. Já tinha visto um relatório de segurança onde o OS X foi o sistema onde foram encontradas mais falhas de segurança. E dizem eles que é o melhor sistema operativo do mundo. Yeah, right.

  14. #44
    Tech Bencher Avatar de reiszink
    Registo
    Feb 2013
    Posts
    5,769
    Likes (Dados)
    0
    Likes (Recebidos)
    0
    Avaliação
    5 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    A questão não é a quantidade de falhas de segurança, mas sim se essas vulnerabilidades são ou não exploradas. E no caso do OSX, poucas ou nenhumas são exploradas, seja pela pouca quota de mercado, pelo perfil de utilizadores que usam OSX, ou outras.

    No caso do Windows, as vulnerabilidades tendem a ser mais problemáticas, logo a começar pelo facto de ser um SO usado por "toda a gente", mais aliciante para pessoas com intuitos menos nobres. Já para não falar que, é um SO pau para toda a obra, basta ver a quantidade de gente que usa PCs Windows para piratarias, onde a probabilidade de chatices aumenta exponencialmente.
    Intel i7 5820K - ASRock X99M Killer - 16GB G.Skill DDR4 - Gigabyte GTX 980Ti G1 - Plextor M6e 256GB + Samsung 850 EVO 500GB - Corsair H110 - EVGA G3 750W - Acer 27" 144Hz IPS - Zowie EC2-A - Filco Majestouch 2 TKL - HyperX Cloud II Pro

  15. #45
    Tech Ubër-Dominus Avatar de Jorge-Vieira
    Registo
    Nov 2013
    Local
    City 17
    Posts
    30,121
    Likes (Dados)
    0
    Likes (Recebidos)
    2
    Avaliação
    1 (100%)
    Mentioned
    0 Post(s)
    Tagged
    0 Thread(s)
    Chrome To Be Improved Thoroughly For OS X Users

    There is absolutely no individual on this planet who does not possess ambiguous feelings for Google’s Chrome browser. On one hand, the application provides us with a plethora of features in order to make our web experience less arduous and on the other hand, it takes a humongous bite from our vital system resources such as processing speed and memory. However, that is about to change, particularly for OS X users. In a bid to prevent OS X users switch to using Apple’s default browser Safari, the development team employed at Google will release a flurry of updates, which will improve the overall experience for every user inclined on using Apple’s desktop and laptop platform.

    Chrome Update For OS X Will Improve Battery Life, And Reduce Memory And Processor Consumption

    Macrumors reports that Google wants to maintain its web browser market share and in order to do that, the Chrome development team is making huge strides to ensure that the web application retains that current position. In order to do this, the team led by Peter Kasting will pause flash content on web-pages; only if users have not viewed them for a considerably long period. How long is considerably long? We have yet to find out.
    Additionally, the Chrome update for OS X will become much more battery friendly, since there were constant virtual rants from users stating that using the web browser for prolonged periods resulted in a 2-3 hour battery backup time reduction on their laptops. According to Kasting, he states that:
    “Renderers for background tabs get a lower priority, reducing idle wakeups on various perf test, in some cases by significant amounts.”




    Previously, Chrome was utilizing three times the amount of processor usage in contrast to Safari. With the upcoming update, not only will CPU consumption will be at par with Safari, but lesser number of pings will be administered from the browser to the processor, in order to conserve more battery life than before.
    If you thought that OS X will be the only platform receiving the royalty treatment; it was reported four weeks ago that a RAM consumption fix was going to be implemented in Chrome, which would benefit all devices with a low and high RAM count.
    While this effort is only being executed in order to maintain its web browser’s market share, we are glad to see that Google is doing something to give Chrome users the best possible experience from the company’s products.


    http://www.portugal-tech.pt/image.php?type=sigpic&userid=566&dateline=1384876765

 

 
Página 3 de 6 PrimeiroPrimeiro 12345 ... ÚltimoÚltimo

Informação da Thread

Users Browsing this Thread

Estão neste momento 1 users a ver esta thread. (0 membros e 1 visitantes)

Bookmarks

Regras

  • Você Não Poderá criar novos Tópicos
  • Você Não Poderá colocar Respostas
  • Você Não Poderá colocar Anexos
  • Você Não Pode Editar os seus Posts
  •