I'm more surprised the PPC Macintosh was bought in 2007.
The PPC Power Macs were superseded by the Intel Mac Pro in Aug 2006 and no longer sold.
Yep. Unless they got an old-stock discount on a Power Mac G5, it was probably a 1st generation Mac Pro.
We easily hosted 5000 highly active e-mail users on what was the equivalent of a Power Mac 7200/90...if a Power Mac G5/Mac Pro couldn't keep up, it was configured wrong...
I should add not "new", but new to the NES. Same connector used by the Wii.
I realize Nintendo wanted to update the unit for easy connection to modern TVs (HDMI), but they could have at least made the controllers backward-compatible. So much for using an NES Advantage on this thing...
It had to be in the last update to the iOS app on June 24th. I was very recently traveling with a group of people who all carried smartphones, but we never shared any information, photos or tagged each other. Basically, all communications were off the grid between us.
When I returned from my trip, several of the people from the group were in the "People you may know" section.
All good malware runs in safe mode too. Good luck getting anything well written off of the box without offlining the disk.
This development makes me a bit nervous since VMs and commercialized sandboxes are how a lot of products like Palo Alto's own Wildfire function.
The actual file itself is not malicious. You can open it on any OS with any MS Office-compatible product and be fine. If is if and when the macro is executed that it goes out to web to pull down a downloader Trojan. Lately, the downloaders have been pulling in copies of CryptoWall and banking Trojans such as Dridex.
CryptoWall/CTB-Locker/Cryptolocker (or whatever the variant's name is this month) seems to have difficulty with or is rather slow at getting to data stored in the container for the Volume Snapshot Service. For businesses that do not allow their users to run as administrators (or have them elevate from a privileged account), they can typically restore a reasonably recent snapshot of data folder by folder using the Previous Versions option.
If the user is an admin, I've found that the window for recovery using VSS is smaller, but certainly better than nothing. Network shares should be restored from backups or VSS from the server (if Windows). I haven't figured out what to do with flash drives quite yet....even most data recovery software doesn't find much since the files are never really erased, just overwritten with encrypted copies.
We started seeing exploits of Flash Player (CVE-2015-3105) containing CryptoWall payloads last week. This new one probably has the ability to carry out a very similar payload, but is instead concentrating on backdoor access, potentially for botnet building or data extraction.
...right out of the AirPort Extreme manual?
To set up your AirPort Extreme using a Mac, you need the following:
A Mac computer with an AirPort or AirPort Extreme Card installed to set it up wirelessly, or a Mac computer connected to an AirPort Extreme Base Station with an Ethernet cable to set it up using Ethernet
To set up your AirPort Extreme using a Windows PC, you need the following:
A Windows PC with 300 MHz or higher processor speed and a compatible 802.11a, 802.11b, 802.11g, or 802.11n wireless card to set it up wirelessly, or a Windows computer connected to an AirPort Extreme Base Station with an Ethernet cable to set it up using Ethernet
I own several AirPort Extreme/Express devices...range and performance are just as good as other premium consumer-brand routers and access points. I have several Extremes sitting in an 802.1x environment...rock solid reliability and performance. If I had one complaint, it would be that the radio is a bit noisy...in a quiet room, you can often hear a tinny squeal when under load.
This suspiciously sounds like CryptoWall. I'd be willing to bet that an admin or other highly privileged user got infected and had the keys to the kingdom sitting on a mounted network drive.
I had one of these guys playing around in a Windows XP VM for about 45 minutes. They're clueless and can't deviate from what appears to be a line-by-line script. He never noticed the VMware Tools task tray icon, never noticed the VM services, didn't notice that it was pretty much a box clean of all typical user data.
They want to almost always connect to your PC via Ammyy Admin (which has/had a pretty nasty vuln that allowed YOU to take over THEIR PC).
Have you ever heard of a NAS?
Considering top media center apps like Plex have broken or no support for DVD/BR playback, I don't understand your logic.
...that Samsung wishes they had.
I don't want to be young again, I just don't want to get any older.