tag:blogger.com,1999:blog-7107301106676015736.post5744601757828689034..comments2024-03-21T06:44:59.435-04:00Comments on AppleHaters: Most vulnerable operating systems and applications in 2014Unknownnoreply@blogger.comBlogger10125tag:blogger.com,1999:blog-7107301106676015736.post-42894277478091252572015-04-21T10:45:52.779-04:002015-04-21T10:45:52.779-04:00It's really just showing that Apple is vulnera...It's really just showing that Apple is vulnerable like everything else. Apple isn't any better and, if you think about it, because they cost more they are actually worse. I've never had a virus and I've know Mac owners that have had many.Dustinhttp://1.2.3.4noreply@blogger.comtag:blogger.com,1999:blog-7107301106676015736.post-1396584505214716562015-04-20T11:44:18.003-04:002015-04-20T11:44:18.003-04:00Seriously. Why don't you use your Google acco...Seriously. Why don't you use your Google account? That way you'll be completely unique. Unless you are too afraid. Dustinhttp://www.dustindiamond.comnoreply@blogger.comtag:blogger.com,1999:blog-7107301106676015736.post-56508169107913141632015-04-19T07:23:03.530-04:002015-04-19T07:23:03.530-04:00So I suppose there is only one Brett in the world ...So I suppose there is only one Brett in the world now? Did you learn your backwards logic from Apple? Bretthttp://192.168.1.1noreply@blogger.comtag:blogger.com,1999:blog-7107301106676015736.post-89244173834983175352015-04-19T03:11:27.187-04:002015-04-19T03:11:27.187-04:00And you're the guy who started commenting on t...And you're the guy who started commenting on this site using the user name I'd established rather than coming up with a unique name of your own.<br /><br />Did you learn how to slavishly copy from Samsung?Brettnoreply@blogger.comtag:blogger.com,1999:blog-7107301106676015736.post-65948149825034106272015-04-16T12:14:29.126-04:002015-04-16T12:14:29.126-04:00Posting as Anonymous.... really brave of you. Ano...Posting as Anonymous.... really brave of you. Another butt-hurt Apple coward.Bretthttp://8.8.8.8noreply@blogger.comtag:blogger.com,1999:blog-7107301106676015736.post-84625698361606513582015-04-16T06:03:18.446-04:002015-04-16T06:03:18.446-04:00Windows total exploits = 210
Mac OS X = 147
Who i...Windows total exploits = 210 <br />Mac OS X = 147<br />Who is the loser here?<br />Very telling that Android the most popular mobile OS is left off. Very biased report. <br />Also, check out the browser vulnerabilities in same report. IE = 242, Chrome = 124.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-7107301106676015736.post-1576012831340078872015-02-28T18:51:55.419-05:002015-02-28T18:51:55.419-05:00My original comment was sufficient.
Why was there...My original comment was sufficient.<br /><br />Why was there no statistic reported for Android vulnerability? Were they too ashamed to list it? Why weren't the OS vulnerability counts split among legacy versions as they were for Windows (XP, 7, 8, 8.1, Vista)?<br /><br />I don't know if the report was intended to mislead or just incompetently prepared, but it is not a full and accurate accounting.<br /><br />Dave's response added nothing of substance worth refuting.<br /><br />You can both take your "hah", "aww", "upset", "fanboy" taunts back to elementary school.Brettnoreply@blogger.comtag:blogger.com,1999:blog-7107301106676015736.post-82548231482365758972015-02-28T12:10:23.969-05:002015-02-28T12:10:23.969-05:00Hah. Didn't think so Brett. Your silence spea...Hah. Didn't think so Brett. Your silence speaks volumes!<br /><br />#BoycottAppleKeith199noreply@blogger.comtag:blogger.com,1999:blog-7107301106676015736.post-91283573444216485452015-02-27T05:29:37.877-05:002015-02-27T05:29:37.877-05:00Aww. Did someone upset the Apple fanboy? Take your...Aww. Did someone upset the Apple fanboy? Take your buggy OS and overpriced hardware and go make your own blog. Unless you're a coward and want to hide behind anonymity by posting unsubstantiated claims in a comment section of a real blog. Put your money where your mouth is. Of course, if what you're saying is all lies and fluff, you'll do nothing.Davehttps://www.blogger.com/profile/00502982231712819528noreply@blogger.comtag:blogger.com,1999:blog-7107301106676015736.post-18484896740374249192015-02-27T01:44:57.442-05:002015-02-27T01:44:57.442-05:00An excellent example of how statistics can be dist...An excellent example of how statistics can be distorted to support any desired conclusion.<br /><br />I especially like how Windows is broken out into its numerous versions while all OS X versions are lumped together as one line item in order to increase the vulnerability tally.<br /><br />Conspicuous in its absence is Android, the real winner (or loser), which suffers from over 90% of known mobile exploits.<br /><br />Elsewhere on the web you can find a more thorough list of criticisms of this report.Brettnoreply@blogger.com