will a PPC cloned boot drive work as the boot drive for an Intel?

2009-07-28 Thread amorielljason





My dual 2.5 G5 with the CPU error that wouldn't boot (possibly due to bad capacitor acc. to earlier respnses) is still dead. The local tech cloned its boot drive onto an external hard drive for me so that I could use it to boot our Mac Mini. He said he wasn't sure if it would work as the boot drive for an Intel Mac. When I select it as the boot drive, the keyboard won't work when it finally finishes booting. Does anyone know if an Intel Mac can be booted from a PPC boot drive? 

I wouldn't bother; however, the mail, calendar, and address book files don't seem to be readily accessible. I drag and dropped the files that were indicated in Apple's support pages and other places on the web as the appropriate datafiles from the clone drive to the Mini, but they still don't seem to come up with the data, so this is plan b.

Thanks.
Jason






Re: will a PPC cloned boot drive work as the boot drive for an Intel?

2009-07-28 Thread amorielljason







 

 Macmini2,1
  Processor Name:	Intel Core 2 Duo
  Processor Speed:	2 GHz
  Number Of Processors:	1
  Total Number Of Cores:	2
  L2 Cache:	4 MB
  Memory:	3 GBI'll try the archive and install migration this weekend since the brute force drag and drop wasn't successful.> 
> What flavor of Mac Mini do you have? And what version of OS X is it using?
> 
> -irrational john
> 
> --~--~-~--~~~---~--~~
> You received this message because you are subscribed Low End Mac's G3-5 List, a 
> group for those using G3, G4, and G5 desktop Macs - with a particular focus on 
> Power Macs.
> The list FAQ is at http://lowendmac.com/lists/g-list.shtml and our netiquette 
> guide is at http://www.lowendmac.com/lists/netiquette.shtml
> To post to this group, send email to g3-5-list@googlegroups.com
> To unsubscribe from this group, send email to 
> g3-5-list-unsubscr...@googlegroups.com
> For more options, visit this group at 
> http://groups.google.com/group/g3-5-list?hl=en
> Low End Mac RSS feed at feed://lowendmac.com/feed.xml
> -~--~~~~--~~--~--~---
> 












Re: will a PPC cloned boot drive work as the boot drive for an Intel?

2009-07-28 Thread amorielljason







 

The PPC G5 was running 10.5 (.2 I believe).  I tried again.  It will boot from the cloned G5 drive on the external hard drive, but the mouse still fails to work after boot-up, regardless of which USB port I try. 

 -- Original message from John Martz zjo...@gmail.com>: --


> 
> On Tue, Jul 28, 2009 at 7:16 PM,  wrote:
> >  10.5.7 for the OS
> 
> I assume that's what the mini is using ... how about the PPC G5 whose
> recovered install drive you were trying to boot from? What OS was it
> using? (Just wondering if that external drive contained the version of
> Tiger (or later) which supports Intel or an earlier Mac OS.
> 
> -irrational john
> 
> --~--~-~--~~~---~--~~
You received this message because you are subscribed Low End Mac's G3-5 List, a 
group for those using G3, G4, and G5 desktop Macs - with a particular focus on 
> Power Macs.
The list FAQ is at http://lowendmac.com/lists/g-list.shtml and our netiquette 
> guide is at http://www.lowendmac.com/lists/netiquette.shtml
> To post to this group, send email to g3-5-list@googlegroups.com
To unsubscribe from this group, send email to 
> g3-5-list-unsubscr...@googlegroups.com
For more options, visit this group at 
> http://groups.google.com/group/g3-5-list?hl=en
> Low End Mac RSS feed at feed://lowendmac.com/feed.xml
> -~--~~~~--~~--~--~---
> 












Re: G5 troubleshooring: motherboard vs. RAM vs. something else

2009-07-21 Thread amorielljason






When your capacitors were bulged, did you repair or replace the machines? I called the tech. He stated that he had also seen G5 with problem capacitors, but a replacement logic board was needed to fix that, which was a $700 repair so it wasn't worth repairing the machine.

Which leads to the next question: are schools or businesses with a large # of G5's getting a sense of an average lifespan for the dual 2.5 G5's? I've considered buying another G5 and then moving my drives and cards over to the used replacement one, but if the average lifespan is 5-6 years, then that would be a waste of $600 - $700 before too long. Thanks.


 Although I haven't seen any discussion of the G5 towers having the same  capacitor issues as the G5 iMacs it might be worth inspecting the  motherboard. On ours they were just a little bulged. But we were having  all kinds of boot issues.   --~--~-~--~~~---~--~~  You received this message because you are subscribed Low End Mac's G3-5 List, a  group for those using G3, G4, and G5 desktop Macs - with a particular focus on  Power Macs.  The list FAQ is at http://lowendmac.com/lists/g-list.shtml and our netiquette  guide is at http://www.lowendmac.com/lists/netiquette.shtml  To post to this group, send email to g3-5-list@googlegroups.com  To unsubscribe from this group, send email to  g3-5-list-unsubscr...@googlegroups.com  For more options, visit this group at  http://groups.google.com/group/g3-5-list?hl=en  Low End Mac RSS feed at feed://lowendmac.com/feed.xml  -~--~~~~--~~--~--~---  






Re: G5 troubleshooring: motherboard vs. RAM vs. something else

2009-07-19 Thread amorielljason







 

The hardware test did recognize the RAM, so I'm assuming it's safe to say that the RAM is fine.> 
> In both the G5 and PC, once the RAM was fully recognized, I've had  
> zero problems.
> 
> --~--~-~--~~~---~--~~
> You received this message because you are subscribed Low End Mac's G3-5 List, a 
> group for those using G3, G4, and G5 desktop Macs - with a particular focus on 
> Power Macs.
> The list FAQ is at http://lowendmac.com/lists/g-list.shtml and our netiquette 
> guide is at http://www.lowendmac.com/lists/netiquette.shtml
> To post to this group, send email to g3-5-list@googlegroups.com
> To unsubscribe from this group, send email to 
> g3-5-list-unsubscr...@googlegroups.com
> For more options, visit this group at 
> http://groups.google.com/group/g3-5-list?hl=en
> Low End Mac RSS feed at feed://lowendmac.com/feed.xml
> -~--~~~~--~~--~--~---
> 













Sophos.com malware article

2009-03-27 Thread amorielljason






I apologize if this was already posted.
Jason
Plattsburgh
Apple Mac malware: caught on camera

Pob in our analysis labs blogged earlier this week about a new variant of the RSPlug Trojan horse for Mac OS X that he had written protection against.
One of the ways in which the OSX/RSPlug-F Mac Trojan horse is being distributed by hackers is in the form of a poisoned HDTV/DTV program called MacCinema.
As you'll see in this video, visiting a website that gives many of the signs of legitimacy, can lead to you downloading a Trojan horse. Even for the Apple Mac.
Apple Mac malware: Caught on camera from Sophos Labs on Vimeo.
The video is also available on YouTube.
And don't try and tell me that this couldn't affect Mac OS X users because they would have to enter their administrator username and password to install the package. If they were prepared to download this program from this website, I feel pretty confident that they would enter their administrator details to allow installation too! 
Mac users are no different to Windows users in this regard - this is social engineering, plain and simple.
Oh, and Windows users shouldn't feel too smug about this either. If you visit the site on a Windows computer, it will serve up a malicious Windows executable from the Zlob family of malware rather than a Mac OS X Trojan horse.
By the way, we tried this on both Firefox and Safari on the Apple Mac. It makes no difference. The attack does not depend on a browser vulnerability - it works by the user being convinced that this is a program that they would like to run on their computer.



Posted on March 25th, 2009 by Graham Cluley, SophosFiled under: Apple, Malware, Video 






malware and web pages

2008-10-28 Thread amorielljason







 

I'm probably missing the obvious here.  This forum doesn't have a lot of Symantec virus scanner software fans, and Norton/Symantec's had problems detecting the malware aimed at ACH bank accounts.  There have been a large # of infected computers in my area lately with malware that has resulted in fraudulent ACH transfers.  According to 1 article I read, 28 out of 32 virus scanning programs didn't detect a recent financial malware.Some of the local victims had key logger viruses.  Some had malware that read the data stored in their auto-forms feature on their browsers and apparently sent that data off to the hacker who wrote the code.  Looking at some of the articles that I googled (and there really aren't very many articles out there now on malware and ACH transfers), it looks like people surfing the internet are more frequently visiting regular web sites that have been compromised / hacked and visiting that web page is resulting in malware scripts being run on the web surfer's computer.Avoiding this malware doesn't seem to be as simple any more as simply not opening attachments from unknown senders.  What's the safe way to secure a Mac (or any computer for that matter) that's used for online banking?  Are there other key terms that I should be googling?  Has anyone seen any in-depth articles, discussions, forums on this financial malware?Thanks.  1 article is below-JasonFrom vnunet.com 10/25/08 An analysis into the use of financial malware has shown that despite a fall in the number of new attacks detected, criminals are still managing to beat security measures designed to stop fraud.The study found that while discoveries of malware aimed at banks and other financial groups appears to be decreasing, this does not indicate a reduced threat. Rather the threats are increasing as malware writers are getting smarter.advertisement“Financial institutions around the world are seeing increasing losses from cybercrime,” wrote Roel Schouwenberg, senior anti-virus researcher atKaspersky Lab.“Investing in better security costs a lot of money. However, this is a choice that banks clearly have to make.”Attack vectors have changed significantly in the last year, according to Kaspersky, with far less reliance on easily blocked spam containing malware to attack code being embedded in web pages.This is in line with other software attacks, but what differentiated the malware for finance houses is its sophistication. Traditional keylogging software is now being replaced by Trojans, that can download ever more complex spying tools.For example, two-factor authentication for online banking, which uses a hardware token in addition to a secret password, is increasingly ineffective. This is because malware writers have perfected the tools to get around it by redirecting the user to a separate server to harvest the necessary access information in real time – the so called ‘man in the middle’ attack.This defeats the two-factor process, but malware writers have taken the process a step further with a new ‘man in the endpoint’ attack. This eliminates the need for a separate server by conducting the entire attack on the user’s machine.“There are several significant advantages to this approach,” Schouwenberg said.“First, there is a direct connection with the financial organisation so there is no chance of a transaction being tagged simply because a user has logged on from an unknown IP address. Second, a man in the endpoint attack will have a better success rate than a man in the middle one if used against a system which employs complex defences.”The situation is being aided by the increasing use of ‘money mules’, people who are recruited to act as recipients of stolen funds and pass them on in the form of e-gold or moneygram certificates to the fraudster in exchange for a 10 to 15 per cent cut.

 -










Re: router recommendations?

2008-09-12 Thread amorielljason






try fixed DNS entries and/or purchase a new router and take it back if it does not work. At work earlier this week there was a problem with the providers dns servers which can really mess things up. Lots of luck.

Thank you. What's the best way to try fixed DNS entries? Googling that didn't shed much light on it.

Jason