![]() Source: Apple WWDC session video (707) and PDF.Įdit: Example of “ Kernel extensions are not from identified developers” added.Įdit 2: Source added. Part about the locking of the /System directory reworded, this because it is unclear in which version of OS X it will be locked down.Įdit 3: Reworded a sentence that stated that people would be unable to use OS X 10.9 Mavericks on their hack. Should have been changed a long time ago, but I forgot about it.ġ. Pike – I regret you/we were criticised you know where, my comments to the STAFF member were in private – but life is too short to be concerned by narrow mindfulness!Ģ. I became a hacker thru Apple’s inability to acknowledge the overheating issues with the 2009 MacPro, which in the end involved the intervention of SJ himself. ![]() Having spent $Ks over the years since the early G4 days I have no problem with the EULA when they were shipping goods that were not of merchantable quality – yes there was a small claims case here. ![]() That is totally besides the point and off topic – however I wonder how much Apple make out of hackers who pay for apps and memberships? I was always surprised that Apple did not introduce a DRM check to validate the equipment that their OS runs on?ģ. A great deal I am sure, and likely now is a good time for an amnesty of sorts as Apple needs to acknowledge the existence of the hackers who by design prefer to build their own kit, rather than buy genuine Apple goods that they cannot modify sufficiently to satisfy their own needs. ![]()
0 Comments
Leave a Reply. |