Maybe it'll be an intel-based tablet; Never know with all these rumors about IBM->intel rumors and with the tablet prototype rumors.
twentyfrets said:Maybe it'll be an intel-based tablet; Never know with all these rumors about IBM->intel rumors and with the tablet prototype rumors.
liketom said:lol maybe a apple pda powerd by intel
![]()
Mitthrawnuruodo said:Not without root or admin privileges... (That's why the sudo grace period is one gaping whole in Mac OS X security, but that's for another thread.)
isaacc7 said:Root or admin privliledges have nothing to do with the CPU architecture! x86 won't run the malicious code without root or admin privledges either... It's just another chip, I wish people would get over this...
animefan_1 said:What software will this x86-based notebook run?
Here is what I'm talking about, this article sums up some of the differences between PPC and x86, from a security POV, and when it comes to buffer overflows, guess what:shawnce said:Exactly.isaacc7 said:Root or admin privliledges have nothing to do with the CPU architecture! x86 won't run the malicious code without root or admin privledges either... It's just another chip, I wish people would get over this...
Isaac
The link to the article is from this thread which was started because the CEO of Intel took a beating in an interview:The vulnerability exists in Microsoft's code, but the exploit depends on the rigid stack-order execution and limited page protection inherent in the x86 architecture. If Windows ran on Risc, that vulnerability would still exist, but it would be a non-issue because the exploit opportunity would be more theoretical than practical.
Pressed about security by Mr. Mossberg, Mr. Otellini had a startling confession: He spends an hour a weekend removing spyware from his daughter's computer. And when further pressed about whether a mainstream computer user in search of immediate safety from security woes ought to buy Apple Computer Inc.'s Macintosh instead of a Wintel PC, he said, "If you want to fix it tomorrow, maybe you should buy something else."
I don't have to guess... buffer overflow exploits still exist on PPC and can be used for nefarious means.Mitthrawnuruodo said:Here is what I'm talking about, this article sums up some of the differences between PPC and x86, from a security POV, and when it comes to buffer overflows, guess what:
Rocket Rion said:Almost 2000 messages in 24 hours about something that hasn't happened yet and nobody here knows anything about.
Over-react much?
I haven't said they don't exist (or that they cannot be taken advantage off, somehow, theoretically). But the PPC architecture prevents the code from buffer overflows to be executed automatically. And therein lays a BIG difference between the x86 and the PPC CPUs...shawnce said:I don't have to guess... buffer overflow exploits still exist on PPC and can be used for nefarious means.
Mitthrawnuruodo said:Here is what I'm talking about *rest snipped*
Mitthrawnuruodo said:I haven't said they don't exist (or that they cannot be taken advantage off, somehow, theoretically). But the PPC architecture prevents the code from buffer overflows to be executed automatically. And therein lays a BIG difference between the x86 and the PPC CPUs...
Oh, we're back to that one, now...tdewey said:Well, I'm a little leery of claims that the PPC is somehow less vulnerable a chip than the x86. A lot more crackers are trying to hack the x86/Wintel than the PPC/MacOSX.
I just read somewhere that Apple has dropped to 1.8 % of the worldwise market. That just blows.
Mitthrawnuruodo said:Not without root or admin privileges... (That's why the sudo grace period is one gaping whole in Mac OS X security, but that's for another thread.)
tdewey said:I just read somewhere that Apple has dropped to 1.8 % of the worldwise market. That just blows.
tdewey said:I just read somewhere that Apple has dropped to 1.8 % of the worldwise market. That just blows.
The big surprise, I suppose, is that the article's author is incorrect?Mitthrawnuruodo said:Here is what I'm talking about, this article sums up some of the differences between PPC and x86, from a security POV, and when it comes to buffer overflows, guess what:
michaellehn said:The virus problem has really nothing to do with the used processor. Just believe it.
You really think that somebody would write an virus in assembly code, that is independant of the operating system? Do you have an idea how impressive that would be?? Such a virus probably would have to include its own OS...
No, will you please read what I've written...michaellehn said:The virus problem has really nothing to do with the used processor. Just believe it.
You really think that somebody would write an virus in assembly code, that is independant of the operating system? Do you have an idea how impressive that would be?? Such a virus probably would have to include its own OS...
Then where is the Mac OS X viruses exploiting this...?iMeowbot said:The big surprise, I suppose, is that the article's author is incorrect?
This can be verified empirically, by loading up vulnerable versions of OS X and running the published exploits for them, and realizing that the resulting root shells were produced courtesy of the code provided in the exploit programs' string data. That's not theoretical, it's actual.
isaacc7 said:Root or admin privliledges have nothing to do with the CPU architecture! x86 won't run the malicious code without root or admin privledges either... It's just another chip, I wish people would get over this...
Isaac