Mac OS X

Nga Wikipedia, enciklopedia e lirë
Shko te: navigacion, kërko
OS X
The OS X logo that says "OS X"
Kompania / zhvilluesi Apple Inc.
Programuar në

[[CThe malware also had a backup mechanism that relied on a domain name generation algorithm (DGA) to ensure that computers can receive commands even when they got disconnected from the peer-to-peer network. Through this mechanism the malware generated random-looking domain names at certain time intervals and tried to access them. Attackers were able to predict which domain names the bots will generate on a certain day, and could register one of those domains in advance to issue commands.

On Thursday, more than a month after the takedown, researchers from Malcovery Security spotted several email spam campaigns distributing a Trojan program that appears to be heavily based on the Gameover Zeus binary. The modification no longer relies on a peer-to-peer infrastructure and uses a DGA as the primary command-and-control mechanism.The malware also had a backup mechanism that relied on a domain name generation algorithm (DGA) to ensure that computers can receive commands even when they got disconnected from the peer-to-peer network. Through this mechanism the malware generated random-looking domain names at certain time intervals and tried to access them. Attackers were able to predict which domain names the bots will generate on a certain day, and could register one of those domains in advance to issue commands.

On Thursday, more than a month after the takedown, researchers from Malcovery Security spotted several email spam campaigns distributing a Trojan program that appears to be heavily based on the Gameover Zeus binary. The modification no longer relies on a peer-to-peer infrastructure and uses a DGA as the primary command-and-control mechanism.The malware also had a backup mechanism that relied on a domain name generation algorithm (DGA) to ensure that computers can receive commands even when they got disconnected from the peer-to-peer network. Through this mechanism the malware generated random-looking domain names at certain time intervals and tried to access them. Attackers were able to predict which domain names the bots will generate on a certain day, and could register one of those domains in advance to issue commands.

On Thursday, more than a month after the takedown, researchers from Malcovery Security spotted several email spam campaigns distributing a Trojan program that appears to be heavily based on the Gameover Zeus binary. The modification no longer relies on a peer-to-peer infrastructure and uses a DGA as the primary command-and-control mechanism.The malware also had a backup mechanism that relied on a domain name generation algorithm (DGA) to ensure that computers can receive commands even when they got disconnected from the peer-to-peer network. Through this mechanism the malware generated random-looking domain names at certain time intervals and tried to access them. Attackers were able to predict which domain names the bots will generate on a certain day, and could register one of those domains in advance to issue commands.

On Thursday, more than a month after the takedown, researchers from Malcovery Security spotted several email spam campaigns distributing a Trojan program that appears to be heavily based on the Gameover Zeus binary. The modification no longer relies on a peer-to-peer infrastructure and uses a DGA as the primary command-and-control mechanism.The malware also had a backup mechanism that relied on a domain name generation algorithm (DGA) to ensure that computers can receive commands even when they got disconnected from the peer-to-peer network. Through this mechanism the malware generated random-looking domain names at certain time intervals and tried to access them. Attackers were able to predict which domain names the bots will generate on a certain day, and could register one of those domains in advance to issue commands.

On Thursday, more than a month after the takedown, researchers from Malcovery Security spotted several email spam campaigns distributing a Trojan program that appears to be heavily based on the Gameover Zeus binary. The modification no longer relies on a peer-to-peer infrastructure and uses a DGA as the primary command-and-control mechanism.The malware also had a backup mechanism that relied on a domain name generation algorithm (DGA) to ensure that computers can receive commands even when they got disconnected from the peer-to-peer network. Through this mechanism the malware generated random-looking domain names at certain time intervals and tried to access them. Attackers were able to predict which domain names the bots will generate on a certain day, and could register one of those domains in advance to issue commands.

On Thursday, more than a month after the takedown, researchers from Malcovery Security spotted several email spam campaigns distributing a Trojan program that appears to be heavily based on the Gameover Zeus binary. The modification no longer relies on a peer-to-peer infrastructure and uses a DGA as the primary command-and-control mechanism.The malware also had a backup mechanism that relied on a domain name generation algorithm (DGA) to ensure that computers can receive commands even when they got disconnected from the peer-to-peer network. Through this mechanism the malware generated random-looking domain names at certain time intervals and tried to access them. Attackers were able to predict which domain names the bots will generate on a certain day, and could register one of those domains in advance to issue commands.

On Thursday, more than a month after the takedown, researchers from Malcovery Security spotted several email spam campaigns distributing a Trojan program that appears to be heavily based on the Gameover Zeus binary. The modification no longer relies on a peer-to-peer infrastructure and uses a DGA as the primary command-and-control mechanism. Programming Language|C]], C++, Objective-C[1][2]
Familja OS Mac OS, Unix-like (until Mac OS X 10.5), Unix (From Mac OS X 10.5)[3][4][5][6][7]
Shteti Current
Burimi Closed source (with open source components)
Publikimi fillestar 24 Mars 2001; 6112 ditë më parë
Targeti tregëtimit Personal computing
Gjuhët Multi-lingual
Modeli i përditësimit Apple Software Update
Mac App store
Platformat e mbështetura
Lloji kernel Hybrid (XNU)
Ndërfaqja përdoruesit Graphical (Aqua)
Licensa Proprietary EULA
Paraprirë nga Mac OS 9
Faqja zyrtare www.apple.com/osx

Mac OS X (shqipëtimi mak ou es ten, ose në shqip, mak o së dhjetë) është një linjë e sistemeve operativë grafikë, zhvilluar, tregtuar dhe shitur nga Apple Inc., versioni i fundit i të cilit është i instaluar mbi të gjithë kompjuterat Macintosh sot në shpërndarje. Mac OS X është pasardhësi i Mac OS, i cili ka qenë sistemi operativ kryesor për Apple që nga viti 1984. Ndryshe nga paraardhësi i tij, Mac OS X bazohet mbi sistemin Unix.

Versioni i parë qe Mac OS X Server 1.0 në vitin 1999, që ndiqet nga një version per desktop Mac OS X v10.0, i vitit 2001. Që atëherë, edhe pesë versione të tjera (end-user dhe server) janë lëshuar. Emërtimi i versioneve behet sipas familjes se maceve te mëdha, p.sh. Mac OS X v10.5 referohet nga Apple dhe përdoruesit me emrin "Leopard".


references[redakto | redakto tekstin burimor]

  1. ^ "Apple Developer: Cocoa Overview". Apple. Marrë më April 9, 2010. 
  2. ^ "Apple Developer: Mac OS X Technology Overview" (PDF). Apple. Marrë më April 9, 2010. 
  3. ^ "Mac OS X 10.5 on Intel-based Macintosh computers". The Open Group. Marrë më November 22, 2009. 
  4. ^ "Mac OS X 10.6 on Intel-based Macintosh computers". The Open Group. Marrë më April 7, 2010. 
  5. ^ "Mac OS X 10.8 on Intel-based Macintosh computers". The Open Group. Marrë më July 25, 2012. 
  6. ^ {{cite webThe malware also had a backup mechanism that relied on a domain name generation algorithm (DGA) to ensure that computers can receive commands even when they got disconnected from the peer-to-peer network. Through this mechanism the malware generated random-looking domain names at certain time intervals and tried to access them. Attackers were able to predict which domain names the bots will generate on a certain day, and could register one of those domains in advance to issue commands. On Thursday, more than a month after the takedown, researchers from Malcovery Security spotted several email spam campaigns distributing a Trojan program that appears to be heavily based on the Gameover Zeus binary. The modification no longer relies on a peer-to-peer infrastructure and uses a DGA as the primary command-and-control mechanism. | url=http://www.apple.com/server/macosx/technology/unix.html | title=Apple page on UNIX | publisher=Apple | accessdate=November 5, 2008 }}
  7. ^ "Apple technology brief on UNIX" (PDF). Apple. Marrë më November 5, 2008.