Sometime early last year I decided I’d like to get a PowerBook. Ideally, one dual-booting Mac OS and Linux. I spent several months saying “I don’t really need a laptop,” but I really started to like the idea after a while, and Katie started to like the idea too, and this January I went so far as to contact TerraSoft Solutions about pricing. TerraSoft maintains their own PPC Linux distribution, Yellow Dog Linux, and their stock in trade is selling Macs preconfigured to dual-boot Mac OS and Linux.

I decided not to buy one then for two reasons: We had the wedding coming up, and I figured Apple was likely to upgrade the line by summer.

Well, the wedding is next weekend, and Apple has just announced upgrades to the PowerBook line.

It may be time to start looking at PowerBooks again.

Apparently a security firm has discovered a way to trick Mac OS X into running a trojan horse. The technique involves creating a data file, but embedding a Carbon program in it. (Carbon is a programming interface aimed at making it easy to convert older Mac applications to run on Mac OS X without switching into Classic mode.)

According to Intego, Finder will see only the file type data display a spoofed icon identifying the file as (in their example) an MP3, but actually double-clicking on the file will cause the OS to notice the program code and run it. Their proof-of-concept code runs itself, then opens the file in iTunes in order to avoid looking suspicious.

This is very similar to a (fixed, but still present in a zillion unpatched systems) bug in Internet Explorer for Windows that was exploited by many mass-mailing viruses. In that case, IE would decide whether a file was safe by checking the MIME type sent by the server, then use the file extension to decide how to load the file. Viruses would generate messages embedding supposed MIDI files that Outlook would try to play, but instead of handing it to a MIDI player, it would ask the OS to open the file. Without the MIME info, Windows would see it was a program file and run the virus.

If this is confirmed, it will probably not be a vector for e-mail viruses, because the standard mail and web apps for Mac OS X don’t automatically run things the way Outlook, Outlook Express and Internet Explorer do.

No, the real danger will be viruses that spread through peer-to-peer file sharing networks. Download a supposed MP3 off of Gnutella, open up your music folder, double-click on it, and you’re infected.

Apple has said they “are aware of the potential issue… and are working proactively to investigate it.”

(Why is this news? Because it’s Apple, and because it’s so similar to a popular virus vector in Windows. Exploitable vulnerabilities are found so often in Windows I hardly blink.)

Updated slightly based on some real analysis (see comments).

I found this article on OSNews: A History of Apple’s Operating Systems. The article starts with the Apple II and works its way up to Mac OS X, touching all the various branches in between – as well as Apple OSes that never quite made it out the door, and other OSes – like NeXtStep (whatever the capitalization is) – that influenced it on its way. Hey, where else are you going to find screenshots of the Apple I and Macintosh System 1?

It’s a fascinating read. I suspect the site will be due for another Slashdotting soon…