The new OS X 10.6.2 update fixes lots of general bugs and glitches and patches numerous security vulnerabilities. Reports are that it also disables at least some "hackintoshes," or PCs modified to run OS X.
The new OS X 10.6.2 update fixes lots of general bugs and glitches and patches numerous security vulnerabilities. Reports are that it also disables at least some "hackintoshes," or PCs modified to run OS X.The upgrade, formally known as Mac OS X v10.6.2/Security Update 2009-006, weighs in at a hefty 473 MB and contains 38 fixes for such serious issues as the well-publicized guest account data loss phenomenon and such relatively trivial issues as the return of deleted RSS feeds. The complete list of glitches addressed is here.
More important -- well, except maybe for the lost data issue -- are the 43 security fixes. They range from improvements to OS X Server's Adaptive Firewall's ability to detect attempt to guess passwords, to buffer overflow vulnerabilities related to Common Document Format files, to multiple heap overflows in Subversion. (The full list is here.) Don't know what any of that means? Don't worry about it. Just choose Software Update from the Apple menu and let your Mac take care of downloading the update itself. Or, if you prefer, get the update from the Apple Downloads page here.
One additional note: as was widely rumored on Apple blogs last week, this update apparently will not work with the Intel Atom processor, the processor used in some popular netbooks. That means that anyone who turned their Atom-based netbook into a hackintosh -- i.e., hacked the non-Apple hardware to run OS X -- should avoid this update, at least for now. Hackintosh fans expect that someone will write a workaround for whatever it is that 10.6.2 does, but that remains to be seen. There will be some manufactured outrage about this "high-handed" move by Apple, but it's hard to take too seriously complaints that Apple hasn't maintained support for hardware it explicitly tells you not to use. And it's an example of what I've said before, that hackintoshes are fine for hobbyists but no one should be running a business on one.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.