The playstation emulator for iPhone now released

psx4iPhone – was just released. It has been in private beta for a little while now, but now its first public release, at Version

Apple Lawyering Up On “fake Steve Jobs”

An anonymous reader sends us to The Secret Diary of Steve Jobs for a developing situation. Daniel Lyons, a.k.a. Fake Steve Jobs, made a post earlier today revealing that Apple was offering him some money (in the wake of the ThinkSecret shutdown) to close down his blog. He said he was interested in taking it. A few hours later, Lyons posted again revealing that Apple’s lawyers had contacted him angrily, saying the details of the deal were supposed to remain private. Fake Steve replied ‘we either deal out in the open, completely transparently, or we don’t deal.’ A third post gives details of Apple’s lawyers’ next response, going totally medieval on him. Since then the situation has calmed down a bit.

Read more of this story at Slashdot.

Apple’s year-end report Card

Somewhere between 2006 and today, I stopped considering Apple an underdog. And I’m not just talking about their iPod numbers nor am I talking about their no-where-close to Windows marketshare. I mean, screw marketshare, really: Does Porsche outsell Honda?

what is Rixstep doing to Stepwise?

It appears that the guy behind the “rixstep” blog has stolen material from Stepwise, a highly-respected news and technical site which has served NeXTSTEP and Cocoa developers for over a decade. On the main page at Stepwise right now, there’s a notice from Scott Anguish stating that Rixstep is violating his copyrights.

unique: Apple to undertake Intel’s extremely-mobile laptop platform

Apple Inc. will form a closer bond with once-rival Intel Corp. early next year when it begins building a new breed of ultra-mobile processors from the chipmaker into a fresh generation of handheld devices, AppleInsider has learned.

iTunes Tutorials: study to make use of iTunes fast.

Just got a new iPod? Then visit iTunes Tutorials. It provides a fast and easy way to learn how to get the most out of iTunes. Short videos show you how to Sync Your iPod, Import Music from CDs, Create Playlists, Get Free Podcasts, Shop the iTunes Store, and more. Of course, if you’re giving a friend a new iPod this holiday season, be sure to send your lucky recipient to iTunes Tutorials website. It’s the perfect place to help them get started with iTunes.

Apple has sold 5 million iPhones

Apple has sold 5 million iPhones, according to 9 to 5 Mac, an Apple rumor site. At the iPhone’s launch, Steve Jobs set a public goal of selling 10 million iPhones — next year. With the iPhone only on sale for six months, that means Apple’s already selling its sleek smartphones at 2008 speed.

Coppola/Murch: 2nd youth

For “Youth without Youth,” his first film in ten years, Francis Ford Coppola returned to self-funded, low-budget filmmaking and to longtime collaborator and Oscar-winning film editor Walter Murch. It took six months for Murch and crew to edit the film, and they depended on Final Cut Studio throughout the six-month editing process. “In the final stages of editing the film, we were working with the ultimate resolution of the film,” says Murch. “So really, the final film, other than the color correction, came out of our editing rooms on Final Cut Pro—in this case Final Cut literally was the final cut.”

military Buys Macs to give a boost to safety

agent_blue writes “The Army is integrating Macs into their IT network to thwart hack attempts. The Mac platform, they argue, is more secure because there are fewer attacks against OS X than Windows-based systems. ‘Military procurement has long been driven by cost and availability of additional software–two measures where Macintosh computers have typically come up short against Windows-based PCs. Then there have been subtle but important barriers: For instance, Macintosh computers have long been incompatible with a security keycard-reading system known as Common Access Cards system, or CAC, which is heavily used by the military. The Army’s Apple program, created [in 2005], is working to change that.'”

Read more of this story at Slashdot.

Vulnerability Numerology – defective via Design?

rdmreader writes “RDM has a point by point disassembly of the security vulnerability story phenomenon. We regularly see these, comparing various vulnerability lists for different operating systems. ZDNet’s George Ou, for example, condemns Linux and Mac OS X by tallying up reported flaws and comparing them against Microsoft’s. What he doesn’t note is that his source, Secunia, only lists what vendors and researchers report. Results selectively include or exclude component software seemingly at random, and backhandedly claims its data is evidence of what it now tells journalists they shouldn’t report. Is Secunia presenting slanted information with the expectation it will be misused?”

Read more of this story at Slashdot.