Category: linked list (page 3 of 52)

OS X 10.10 Yosemite review roundup

The OS X 10.10 Ars Technica Review – the canonical 45,000 word OS review by John Siracusa. Worth it if you have the time, though.

The OS X 10.10 Six Colors Review – Jason Snell’s take

The OS X 10.10 512 Pixels Review – by Stephen Hackett

The New Yorker’s First Animated GIF Cover

The New Yorker’s First Animated GIF Cover – Christoph Niemann’s Rainy Day

Warped England: Why Young People Can’t Buy Houses Anymore

Warped England: Why Young People Can’t Buy Houses Anymore

What To Do If You Break The Screen Of Your iPhone or iPad

What To Do If You Break The Screen Of Your iPhone or iPad – by Scotty Loveless, author of the authoritative iOS Battery Life Troubleshooting Guide

Why can’t you track periods in Apple’s Health app?

ntlk’s blog: Why can’t you track periods in Apple’s Health app? – an interesting question by @ntlk. Also of note: HKBiologicalSex currently only allows for male/female, which seems limited given the spectrum of intersex conditions, biological (XO, XXX, XXY, etc.) and otherwise. I guess HealthKit will improve with time.

TheStocks – royalty free stock photos in one place

TheStocks – royalty free stock photos in one place (via Owltastic)

Backblaze Blog – Hard Drive Reliability Update Sep 2014

Backblaze Blog – Hard Drive Reliability Update Sep 2014 – just look at the failure rate graph, it’s quite remarkable. I think I’ll be buying Hitachi drives from now on and steering well clear of Seagate ones.

DxOMark Mobile Camera Report: Apple iPhone 6

DxOMark Mobile Report: Apple iPhone 6 – their conclusion? “With ‘very good overall exposure, impressive autofocus performance in both low and bright light, good color rendering and nice detail preservation outdoors and indoors’ the Apple iPhone 6 takes the number one spot in DxOMark’s smartphone ranking.”

Chainbreaker – extract user credentials in OS X Keychain

n0fate’s Forensic Lab – Chainbreaker. Chainbreaker can extract encrypted user credentials in OS X Keychain and decrypt it using one of the Master Key, user password and SystemKey. More detailed information here: Keychain Analysis with Mac OS X Memory Forensics (PDF)

Joe Sandbox X – Automated Dynamic Malware Analysis on Mac OS X

Joe Sandbox X – Automated Dynamic Malware Analysis on Mac OS X

« Older posts Newer posts »

© 2019 stefpause.com

Theme by Anders NorenUp ↑