Amazines Free Article Archive
www.amazines.com - Saturday, August 23, 2025
Read about the most recent changes and happenings at Amazines.com
Log into your account or register as a new author. Start submitting your articles right now!
Search our database for articles.
Subscribe to receive articles emailed straight to your email account. You may choose multiple categories.
View our newest articles submitted by our authors.
View our most top rated articles rated by our visitors.
* Please note that this is NOT the ARTICLE manager
Add a new EZINE, or manage your EZINE submission.
Add fresh, free web content to your site such as newest articles, web tools, and quotes with a single piece of code!
Home What's New? Submit/Manage Articles Latest Posts Top Rated Article Search
Google
Subscriptions Manage Ezines
CATEGORIES
 Article Archive
 Advertising (133577)
 Advice (161673)
 Affiliate Programs (34799)
 Art and Culture (73858)
 Automotive (145730)
 Blogs (75623)
 Boating (9851)
 Books (17224)
 Buddhism (4130)
 Business (1331093)
 Business News (426461)
 Business Opportunities (366526)
 Camping (10974)
 Career (72796)
 Christianity (15854)
 Collecting (11638)
 Communication (115089)
 Computers (241958)
 Construction (38977)
 Consumer (49954)
 Cooking (17080)
 Copywriting (6734)
 Crafts (18203)
 Cuisine (7549)
 Current Affairs (20323)
 Dating (45910)
 EBooks (19704)
 E-Commerce (48279)
 Education (185537)
 Electronics (83525)
 Email (6438)
 Entertainment (159864)
 Environment (29004)
 Ezine (3040)
 Ezine Publishing (5454)
 Ezine Sites (1551)
 Family & Parenting (111012)
 Fashion & Cosmetics (196612)
 Female Entrepreneurs (11853)
 Feng Shui (134)
 Finance & Investment (310640)
 Fitness (106493)
 Food & Beverages (63058)
 Free Web Resources (7941)
 Gambling (30227)
 Gardening (25207)
 Government (10519)
 Health (630195)
 Hinduism (2206)
 Hobbies (44083)
 Home Business (91754)
 Home Improvement (251317)
 Home Repair (46263)
 Humor (4729)
 Import - Export (5462)
 Insurance (45105)
 Interior Design (29640)
 International Property (3488)
 Internet (191035)
 Internet Marketing (146690)
 Investment (22864)
 Islam (1161)
 Judaism (1352)
 Law (80500)
 Link Popularity (4596)
 Manufacturing (20936)
 Marketing (99329)
 MLM (14140)
 Motivation (18237)
 Music (27000)
 New to the Internet (9498)
 Non-Profit Organizations (4049)
 Online Shopping (129743)
 Organizing (7813)
 Party Ideas (11855)
 Pets (38165)
 Poetry (2229)
 Press Release (12691)
 Public Speaking (5643)
 Publishing (7566)
 Quotes (2407)
 Real Estate (126921)
 Recreation & Leisure (95497)
 Relationships (87678)
 Research (16182)
 Sales (80372)
 Science & Technology (110301)
 Search Engines (23525)
 Self Improvement (153317)
 Seniors (6224)
 Sexuality (36012)
 Small Business (49405)
 Software (83054)
 Spiritual (23539)
 Sports (116156)
 Tax (7664)
 Telecommuting (34070)
 Travel & Tourism (308305)
 UK Property Investment (3123)
 Video Games (13382)
 Web Traffic (11803)
 Website Design (56951)
 Website Promotion (36673)
 World News (1000+)
 Writing (35853)
Author Spotlight
LEMUEL ASIBAL

Lemuel Asibal is a web content writer who also ventures on writing articles and blog posts about any...more
LINDA HOLLAND

I am a passionate article and blog writer based in South Africa. With a love for life and a strong d...more
JOSEPH ZHOU

China Care Medical has been exporting out Chinese medical equipment for many different countries. We...more
HEINZ RAINER

Thirty years Africa, Asia, Europe | Worked in Industry, Trade | preferred Nations : China, Thailand,...more
AREESH ISHTIAQ

Areesh Ishtiaq a Top Rated SEO and Digital Marketing Guru on Upwork, working as a project manager fo...more


Why malware for macs is on its way - Automatic Traffic Barrier - Barrier Arm Gates by wang dong





Article Author Biography
Why malware for macs is on its way - Automatic Traffic Barrier - Barrier Arm Gates by
Article Posted: 05/24/2012
Article Views: 111
Articles Written: 1102
Word Count: 772
Article Votes: 0
AddThis Social Bookmark Button

Why malware for macs is on its way - Automatic Traffic Barrier - Barrier Arm Gates


 
Business,Business News,Business Opportunities
Follow-up: Malware attempts that use Apple-focused social engineering are now in the wild. I just found one via Google Image search. See for yourself: What a Mac malware attack looks like. Oh, the rationalizations people come up with to explain away what they don’t want to hear. Last week, when I wrote Coming soon to a Mac near you: serious malware, I expected to get an earful from Mac partisans telling me how wrong I was. They didn’t disappoint.

In this post, I want to respond, in detail, to the arguments that I heard in response to that post. They’re the same ones that come up over and over again when the topic turns to Macs and malware. First, there’s the contention that OS X is architecturally superior to other operating systems, that its very design confers immunity from infection. Second, there’s the perfectly reasonable question of numbers: if Macs and Windows PCs are equally vulnerable to attack, how come there are hundreds of thousands of Windows viruses and only a handful of specimens of Mac malware? Those are reasonable arguments, and I want to address them fully, with enough evidence to help you make your own conclusions.

This isn’t about Mac-versus-Windows religion. It’s about engineering and economics. I’ve got my flak jacket fastened, so let’s dive in.

Is OS X architecturally superior to Windows? That’s the argument several commenters made in response to my post. Here’s one example, complete with obligatory homage to Steve Jobs: The architecture and methodology is different at Apple, which is why so many developers (and hackers) hate Macs and iPhones, they can’t get in to do anything really serious. Not to deny anything is possible, but I still feel left out when I use PCs that get infected regularly. And thank Steve for that feeling! Sorry, but that’s not true.

Sensible third parties have acknowledged this for years. In a 2008 post at the Mac-centric Tidbits.com, Security Editor Rich Mogull wrote: It’s not that Mac OS X is inherently more secure against viruses than current versions of Windows (although it was clearly more secure than Windows prior to XP SP2); the numerous vulnerabilities reported and patched in recent years are just as exploitable as their Windows equivalents. But most security experts agree that malicious software these days is driven by financial incentives, and it’s far more profitable to target the dominant platform. […] At some point, assuming Apple continues to make appealing products, we Mac users will become bigger targets and face a higher level of risk. [emphasis added] As I’ve documented in a series of recent posts, social engineering has become the dominant technique that malware authors use to spread their poison.

If you can convince someone that your hostile program is useful or necessary, they will happily (or fearfully) click through all necessary prompts and enter their administrative credentials where required. This is true in Windows, where User Account Control has been a default since 2006. It is equally true in OS X. But, the argument goes, Windows users are victimized by drive-by downloads, and Macs are immune from those! Sorry, but that’s not true either. Like any modern operating system, OSX contains flaws that can be attacked fairly easily. That is why Apple updates it so regularly.

Let’s take just one recent example… In Apple’s security bulletin for the April 22, 2011 release of OS X 10.6.7, I counted 23 separate fixes for vulnerabilities that allow “arbitrary code execution” in the current shipping version of OS X. At least three of those vulnerabilities are new in Snow Leopard and did not exist in previous versions of OS X. For those who aren’t familiar with security terminology, “arbitrary code execution” means “no user interaction required.” It is the nightmare scenario of online security: The attacker sets up a web page containing hostile code or creates an ordinary looking document, image, or movie file. When you visit that web page or open that document or look at that picture or play that video clip—or even if you just download a file—the attacker’s code runs, potentially giving him complete control over your machine. No permission dialog boxes pop up, and no password prompts are required.

But don’t just take my word for it. I’ve gone through that April document, line by line, and pulled out the details. Page 2: 23 flaws, no user interaction required –.

The e-commerce company in China offers quality products such as Automatic Traffic Barrier , Barrier Arm Gates, and more. For more , please visit Automatic Barrier Gate today!

Related Articles - Automatic Traffic Barrier, Barrier Arm Gates,

Email this Article to a Friend!

Receive Articles like this one direct to your email box!
Subscribe for free today!

 Rate This Article  
Completely useless, should be removed from directory.
Minimal useful information.
Decent and informative.
Great article, very informative and helpful.
A 'Must Read'.

 

Do you Agree or Disagree? Have a Comment? POST IT!

 Reader Opinions 
Submit your comments and they will be posted here.
Make this comment or to the Author only:
Name:
Email:
*Your email will NOT be posted. This is for administrative purposes only.
Comments: *Your Comments WILL be posted to the AUTHOR ONLY if you select PRIVATE and to this PUBLIC PAGE if you select PUBLIC, so write accordingly.
 
Please enter the code in the image:



 Author Login 
LOGIN
Register for Author Account

 

Advertiser Login

 

ADVERTISE HERE NOW!
   Limited Time $60 Offer!
   90  Days-1.5 Million Views  

 

Great Paranormal Romance


TIM FAY

After 60-plus years of living, I am just trying to pass down some of the information that I have lea...more
LAURA JEEVES

At LeadGenerators, we specialise in content-led Online Marketing Strategies for our clients in the t...more
ALEX BELSEY

I am the editor of QUAY Magazine, a B2B publication based in the South West of the UK. I am also the...more
STEPHEN BYE

Stephen Bye is a fiction writer. His most recent novels are a 5-book “The Developer” series which be...more
PAUL PHILIPS

For more articles, blog messages & videos and a free e-book download go to www.NewParadigm.ws your p...more
LEVAL AINAH

I am an internet marketer and also an educator. My goal is to help others who are looking to improve...more
STEVERT MCKENZIE

Stevert Mckenzie, Travel Enthusiast. ...more
GENE MYERS

Author of four books and two screenplays; frequent magazine contributor. I have four other books "in...more
ADRIAN JOELE

I have been involved in nutrition and weight management for over 12 years and I like to share my kn...more
MICHAEL BRESCIANI

Rev Bresciani is the author of two Christian books. One book is an important and concisely written b...more

HomeLinksAbout UsContact UsTerms of UsePrivacy PolicyFAQResources
Copyright © 2025, All rights reserved.
Some pages may contain portions of text relating to certain topics obtained from wikipedia.org under the GNU FDL license