Tag Archives: Apple

Q&A Monday: Check MAC AD Authentication

Question: I work for a School District with a very small tech department.  As we are in an educational environment, we are running a mixed environment with Mac’s and PC’s authenticating to a Windows 2003 AD servers, 9 total servers total spread out throughout 8 sites.  I have been running into problems with a few Mac’s in…

Read More

Q&A Monday: How often to replace a buisness Mac

Question: Hey Jim, I am a small business owner and I am constantly struggling with how often do I replace the Apple computers in my office.  I do have some PC’s in the office which I lease on a 3 year cycle, but I’m not sure if I should replace the Apple’s as often as…

Read More

Software Update: iPhone, iPod Touch and iPad Update

Apple has released iOS 4.0.2 for the iPhone and iPod touch and iOS 3.2.2 for the iPad to address vulnerabilities in the FreeType and IOSurface packages. Exploitation of these vulnerabilities may allow an attacker to execute arbitrary code or gain system privileges.    This is most likely to address the jailbreakme.com website that was able…

Read More

Q&A Monday: FaceTime Chat Ports

Question: I am a Mobile Administrator of my company, and recently some of the users have preordered the iPhone 4 and they started to receive these phone’s last week.  There is a new feature called FaceTime, which lets users do a face to face chat on their phone, like Skype.  The users are able to…

Read More

Apple Launches iTunes 9.2

     I’ve been waiting since last week for iTunes to be updated to support the new iPhone, but along with making the software ready for the iPhone, there are some security issues that this new version of iTunes fixes. Apple has released iTunes 9.2 for Windows systems to address multiple vulnerabilities affecting the ColorSync, ImageIO, and…

Read More

Google Releases Chrome Update

Google has released Chrome version 5.0.375.55 for Linux, Mac, and Windows to address multiple vulnerabilities. These vulnerabilities may allow an attacker to bypass security restrictions, execute script in an unsafe context, or mislead users. You can check out this entry for more information about exactly what updated where applied to this new version.  This version…

Read More