The Upper East Side Apple Store, how to install the OS X El Capitan beta, the OSX and iOS vulnerability and much more. Best of the week at SoydeMac

soydemac1v2

At the end of last week we knew the opening plans of what would be one of the Most precious and well-cared Apple Store to dateIndeed, I am referring to the inauguration by Angela Ahrendts (Apple's SVP Retail) of the store located on the Upper East Side of New York, a store built on the basis of a bank preserving all its essence, including the door of the vault that gives access to a VIP room.

In the following outstanding news we find a tutorial on how to install beta 1 of OS X El Capitan without having a developer account, in an easy and simple way, although of course it is recommended to do it in a different partition from our main operating system since it may still contain bugs and incompatibilities to be used daily.

Upper East Side Apple Store

Continuing with OS X, we see how Apple launched on June 16 which is at the moment the latest beta of OS X 10.10.4 Yosemite, which is assumed to be the last or penultimate version of the system before the official launch of OS X El Capitan, a version in which Apple has enabled TRIM support for SSD disks by default as we told you in this post.

rootpipe-vulnerable-exploit-yosemite-0

Another of the outstanding news of the week refers to a vulnerability in both iOS and OS X that would give remote access to any attacker who takes advantage of it to obtain the passwords of our keychain through the installation of applications from unidentified developers, hence the importance sometimes of downloading legal software from trusted sites.

Last but not least, we also teach you how to be able to buy an Apple Watch the day of its departure in Spain on June 26 and so be informed if you are clear about getting this wearable.


Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.

      gam villa said

    (Y)