<article>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#article10_01_25_2153201</id>
	<title>Intego's "Year In Mac Security" Report</title>
	<author>kdawson</author>
	<datestamp>1264447800000</datestamp>
	<htmltext>david.emery notes the release of <a href="http://blog.intego.com/images/yims2009.pdf">Intego's "Year In Mac Security" report</a> (PDF), adding: <i>"Mac OS X and iPhones that haven't been jailbroken fare pretty well (although vulnerabilities exist, there's not been a lot of exploitation). Apple does come in for criticism for 'time to fix' known vulnerabilities. Jailbroken iPhones are a mess. The biggest risk to Macs are Trojan horses, often from pirated software."</i></htmltext>
<tokenext>david.emery notes the release of Intego 's " Year In Mac Security " report ( PDF ) , adding : " Mac OS X and iPhones that have n't been jailbroken fare pretty well ( although vulnerabilities exist , there 's not been a lot of exploitation ) .
Apple does come in for criticism for 'time to fix ' known vulnerabilities .
Jailbroken iPhones are a mess .
The biggest risk to Macs are Trojan horses , often from pirated software .
"</tokentext>
<sentencetext>david.emery notes the release of Intego's "Year In Mac Security" report (PDF), adding: "Mac OS X and iPhones that haven't been jailbroken fare pretty well (although vulnerabilities exist, there's not been a lot of exploitation).
Apple does come in for criticism for 'time to fix' known vulnerabilities.
Jailbroken iPhones are a mess.
The biggest risk to Macs are Trojan horses, often from pirated software.
"</sentencetext>
</article>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30902622</id>
	<title>Re:Apple's DRM seems to be the main problem</title>
	<author>jo\_ham</author>
	<datestamp>1264512840000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>So, you're blaming Apple for a user's inability to think umm, I am installing SSH on my device, maybe I should not use the default root password".</p><p>Right.</p><p>Is it also Ford's fault that I can't easily get into my car because of the draconian limits on copying car keys when I lose my main and spare set?</p></htmltext>
<tokenext>So , you 're blaming Apple for a user 's inability to think umm , I am installing SSH on my device , maybe I should not use the default root password " .Right.Is it also Ford 's fault that I ca n't easily get into my car because of the draconian limits on copying car keys when I lose my main and spare set ?</tokentext>
<sentencetext>So, you're blaming Apple for a user's inability to think umm, I am installing SSH on my device, maybe I should not use the default root password".Right.Is it also Ford's fault that I can't easily get into my car because of the draconian limits on copying car keys when I lose my main and spare set?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901922</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901342</id>
	<title>Biggest Mac security threat...</title>
	<author>Anonymous</author>
	<datestamp>1264539540000</datestamp>
	<modclass>Funny</modclass>
	<modscore>2</modscore>
	<htmltext><p>Installing Windows.</p></htmltext>
<tokenext>Installing Windows .</tokentext>
<sentencetext>Installing Windows.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901478</id>
	<title>You can't handle the truth</title>
	<author>kindnation</author>
	<datestamp>1264498200000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>1</modscore>
	<htmltext><p>As much as Intego wants to present the state of malware on the Mac, the truth is that even Intego works pretty much like any other AV engine which tries to detect malware based on its signature or heuristics (behavioral), that they receive either from someone sending them a sample or collected with their honeypots around the world.</p><p>The bots/trojans/RATs that are written for specific targets, do not have a signature, thus, are undetected.  Then it becomes obvious that Antivirus solutions are not enough.  You also need to control the apps that are reverse connecting (phone home), with products like (Little Snitch).</p><p>What they don't address are the vulnerabilities that exists in every day applications, which subject to a stack buffer overflow, will execute code in memory with the same level of permissions as the application/daemon that is running.  Antivirus doesn't provide any protection for exploits in software.</p><p>On a side note, Intego mentions a "crack" for CS4 which is actually a Trojan, but doesn't mention that Adobe's own CS4 install tries to phone home.</p></htmltext>
<tokenext>As much as Intego wants to present the state of malware on the Mac , the truth is that even Intego works pretty much like any other AV engine which tries to detect malware based on its signature or heuristics ( behavioral ) , that they receive either from someone sending them a sample or collected with their honeypots around the world.The bots/trojans/RATs that are written for specific targets , do not have a signature , thus , are undetected .
Then it becomes obvious that Antivirus solutions are not enough .
You also need to control the apps that are reverse connecting ( phone home ) , with products like ( Little Snitch ) .What they do n't address are the vulnerabilities that exists in every day applications , which subject to a stack buffer overflow , will execute code in memory with the same level of permissions as the application/daemon that is running .
Antivirus does n't provide any protection for exploits in software.On a side note , Intego mentions a " crack " for CS4 which is actually a Trojan , but does n't mention that Adobe 's own CS4 install tries to phone home .</tokentext>
<sentencetext>As much as Intego wants to present the state of malware on the Mac, the truth is that even Intego works pretty much like any other AV engine which tries to detect malware based on its signature or heuristics (behavioral), that they receive either from someone sending them a sample or collected with their honeypots around the world.The bots/trojans/RATs that are written for specific targets, do not have a signature, thus, are undetected.
Then it becomes obvious that Antivirus solutions are not enough.
You also need to control the apps that are reverse connecting (phone home), with products like (Little Snitch).What they don't address are the vulnerabilities that exists in every day applications, which subject to a stack buffer overflow, will execute code in memory with the same level of permissions as the application/daemon that is running.
Antivirus doesn't provide any protection for exploits in software.On a side note, Intego mentions a "crack" for CS4 which is actually a Trojan, but doesn't mention that Adobe's own CS4 install tries to phone home.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901422</id>
	<title>Re:So, avoid pirated Mac software...</title>
	<author>Anonymous</author>
	<datestamp>1264497300000</datestamp>
	<modclass>Offtopic</modclass>
	<modscore>-1</modscore>
	<htmltext><p>But... but... she's hawt!</p></htmltext>
<tokenext>But... but... she 's hawt !</tokentext>
<sentencetext>But... but... she's hawt!</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901222</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30907652</id>
	<title>Re:WTF, people.</title>
	<author>JasonBee</author>
	<datestamp>1264534260000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><a href="http://secunia.com/advisories/27213/2/" title="secunia.com">http://secunia.com/advisories/27213/2/</a> [secunia.com]</p><p>Yeah that is ancient news my friend. It was patched with OS version 1.1.2. in 2007 if my information is correct.</p><p>iPhones and iPods can now run OS version 3.1+</p><p>I would say that pretty much anyone going online has patched as version 3 of the OS brought copy/paste functions.</p><p>I can't imagine using my iPhone or iPod without copy/paste.</p></htmltext>
<tokenext>http : //secunia.com/advisories/27213/2/ [ secunia.com ] Yeah that is ancient news my friend .
It was patched with OS version 1.1.2. in 2007 if my information is correct.iPhones and iPods can now run OS version 3.1 + I would say that pretty much anyone going online has patched as version 3 of the OS brought copy/paste functions.I ca n't imagine using my iPhone or iPod without copy/paste .</tokentext>
<sentencetext>http://secunia.com/advisories/27213/2/ [secunia.com]Yeah that is ancient news my friend.
It was patched with OS version 1.1.2. in 2007 if my information is correct.iPhones and iPods can now run OS version 3.1+I would say that pretty much anyone going online has patched as version 3 of the OS brought copy/paste functions.I can't imagine using my iPhone or iPod without copy/paste.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901828</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901666</id>
	<title>Re:With great freedom comes great resposibility</title>
	<author>DNS-and-BIND</author>
	<datestamp>1264500960000</datestamp>
	<modclass>Funny</modclass>
	<modscore>2</modscore>
	<htmltext>Please don't bash 20/20.  Their scientific methodology might have been a little bit off, but their motives were in the right place.  They were just trying to show that a major car manufacturer was corrupt...this is the media's job, isn't it?  To expose corruption?  Unless you can show that the car manufacturer has lily-white hands (and none of them do) please stop the bashing.  These are educated, dedicated people who are doing a tough job under very difficult circumstances, and it's hard to get the stories to come out the right way 100\% of the time.</htmltext>
<tokenext>Please do n't bash 20/20 .
Their scientific methodology might have been a little bit off , but their motives were in the right place .
They were just trying to show that a major car manufacturer was corrupt...this is the media 's job , is n't it ?
To expose corruption ?
Unless you can show that the car manufacturer has lily-white hands ( and none of them do ) please stop the bashing .
These are educated , dedicated people who are doing a tough job under very difficult circumstances , and it 's hard to get the stories to come out the right way 100 \ % of the time .</tokentext>
<sentencetext>Please don't bash 20/20.
Their scientific methodology might have been a little bit off, but their motives were in the right place.
They were just trying to show that a major car manufacturer was corrupt...this is the media's job, isn't it?
To expose corruption?
Unless you can show that the car manufacturer has lily-white hands (and none of them do) please stop the bashing.
These are educated, dedicated people who are doing a tough job under very difficult circumstances, and it's hard to get the stories to come out the right way 100\% of the time.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901268</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30905750</id>
	<title>Re:With great freedom comes great resposibility</title>
	<author>Anonymous</author>
	<datestamp>1264526520000</datestamp>
	<modclass>Flamebait</modclass>
	<modscore>1</modscore>
	<htmltext><p>I'm not sure what you mean by "basic functionality".</p><p>My iPhone isn't broken and I have tethering enabled. Sounds like your problem is with AT&amp;T. I'm in Canada under Fido/Rogers so YMMV.</p><p>With "both" companies my tethering is enabled with a quick call. My provider asserts that my data plan must be 1 GB or higher, but this is largely to protect me from ignorantly going over my data plan usage allowances. I go to my settings and turn on tethering. There is no step three<nobr> <wbr></nobr>;)</p><p>As for "applications that Apple doesn't [sic] like", you must mean malware, trojans, and data theft mechanisms. If you want to run those by all means do so. You could save yourself some trouble and just write your date of birth and credit card numbers on a placard and hang that around your neck when you head to the mall.</p><p>But I keed.</p></htmltext>
<tokenext>I 'm not sure what you mean by " basic functionality " .My iPhone is n't broken and I have tethering enabled .
Sounds like your problem is with AT&amp;T .
I 'm in Canada under Fido/Rogers so YMMV.With " both " companies my tethering is enabled with a quick call .
My provider asserts that my data plan must be 1 GB or higher , but this is largely to protect me from ignorantly going over my data plan usage allowances .
I go to my settings and turn on tethering .
There is no step three ; ) As for " applications that Apple does n't [ sic ] like " , you must mean malware , trojans , and data theft mechanisms .
If you want to run those by all means do so .
You could save yourself some trouble and just write your date of birth and credit card numbers on a placard and hang that around your neck when you head to the mall.But I keed .</tokentext>
<sentencetext>I'm not sure what you mean by "basic functionality".My iPhone isn't broken and I have tethering enabled.
Sounds like your problem is with AT&amp;T.
I'm in Canada under Fido/Rogers so YMMV.With "both" companies my tethering is enabled with a quick call.
My provider asserts that my data plan must be 1 GB or higher, but this is largely to protect me from ignorantly going over my data plan usage allowances.
I go to my settings and turn on tethering.
There is no step three ;)As for "applications that Apple doesn't [sic] like", you must mean malware, trojans, and data theft mechanisms.
If you want to run those by all means do so.
You could save yourself some trouble and just write your date of birth and credit card numbers on a placard and hang that around your neck when you head to the mall.But I keed.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30903166</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901506</id>
	<title>lose/lose</title>
	<author>starbugs</author>
	<datestamp>1264498680000</datestamp>
	<modclass>Funny</modclass>
	<modscore>2</modscore>
	<htmltext><p>lose/lose (from the article) seems like a fun game to play right before installing Debian.</p></htmltext>
<tokenext>lose/lose ( from the article ) seems like a fun game to play right before installing Debian .</tokentext>
<sentencetext>lose/lose (from the article) seems like a fun game to play right before installing Debian.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901224</id>
	<title>we don't need economic buzz</title>
	<author>Adolf Hitroll</author>
	<datestamp>1264538100000</datestamp>
	<modclass>None</modclass>
	<modscore>-1</modscore>
	<htmltext><p>We need an economist to explain us how the us, by privatizing gains and socializong losses turned into a fascist state.<br>Get up, people, or remain slaves.</p></htmltext>
<tokenext>We need an economist to explain us how the us , by privatizing gains and socializong losses turned into a fascist state.Get up , people , or remain slaves .</tokentext>
<sentencetext>We need an economist to explain us how the us, by privatizing gains and socializong losses turned into a fascist state.Get up, people, or remain slaves.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30907012</id>
	<title>Re:So, avoid pirated Mac software...</title>
	<author>Chris Tucker</author>
	<datestamp>1264531500000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Essentially, yes.</p><p>With the proviso that smart Windows users have the their AV software and definitions all up to date and use something other than Outlook Express and IE for their email and web use.</p></htmltext>
<tokenext>Essentially , yes.With the proviso that smart Windows users have the their AV software and definitions all up to date and use something other than Outlook Express and IE for their email and web use .</tokentext>
<sentencetext>Essentially, yes.With the proviso that smart Windows users have the their AV software and definitions all up to date and use something other than Outlook Express and IE for their email and web use.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901544</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901430</id>
	<title>'Pretty well' isn't good enough</title>
	<author>Anonymous</author>
	<datestamp>1264497420000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext><p>Apple <a href="http://www.serverwatch.com/eur/article.php/3850401/FreeBSD-Shines-While-Apple-Fails.htm" title="serverwatch.com" rel="nofollow">doesn't care enough about security</a> [serverwatch.com].</p></htmltext>
<tokenext>Apple does n't care enough about security [ serverwatch.com ] .</tokentext>
<sentencetext>Apple doesn't care enough about security [serverwatch.com].</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901476</id>
	<title>Re:Biggest Mac security threat...</title>
	<author>Anonymous</author>
	<datestamp>1264498200000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p><div class="quote"><p>Installing Windows.</p></div><p>Is anyone still installing Vista?</p></div>
	</htmltext>
<tokenext>Installing Windows.Is anyone still installing Vista ?</tokentext>
<sentencetext>Installing Windows.Is anyone still installing Vista?
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901342</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30903182</id>
	<title>Re:bad karma</title>
	<author>nexie</author>
	<datestamp>1264516560000</datestamp>
	<modclass>Troll</modclass>
	<modscore>-1</modscore>
	<htmltext>yea still ogged into slashdot

sorry i'm not an immature idiot i just enjoy winding up anal postes such as yourself you loser!


woooooooooooooooooooooooooo


WOOOOOOOOOOOOOOOOOOOOOOOOOOOo



come to ircNET #trolls


we have an entire channel devoted to listening to your unfounded insults


wooooooooooooo</htmltext>
<tokenext>yea still ogged into slashdot sorry i 'm not an immature idiot i just enjoy winding up anal postes such as yourself you loser !
woooooooooooooooooooooooooo WOOOOOOOOOOOOOOOOOOOOOOOOOOOo come to ircNET # trolls we have an entire channel devoted to listening to your unfounded insults wooooooooooooo</tokentext>
<sentencetext>yea still ogged into slashdot

sorry i'm not an immature idiot i just enjoy winding up anal postes such as yourself you loser!
woooooooooooooooooooooooooo


WOOOOOOOOOOOOOOOOOOOOOOOOOOOo



come to ircNET #trolls


we have an entire channel devoted to listening to your unfounded insults


wooooooooooooo</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901382</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901874</id>
	<title>so what they are saying is...</title>
	<author>Anonymous</author>
	<datestamp>1264504200000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>don't jaibreak your iphone, don't trust bittorrent, don't visit suspect sites, don't click on emailed links that are not from trusted sources - well DUH!</htmltext>
<tokenext>do n't jaibreak your iphone , do n't trust bittorrent , do n't visit suspect sites , do n't click on emailed links that are not from trusted sources - well DUH !</tokentext>
<sentencetext>don't jaibreak your iphone, don't trust bittorrent, don't visit suspect sites, don't click on emailed links that are not from trusted sources - well DUH!</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30903338</id>
	<title>Re:So, avoid pirated Mac software...</title>
	<author>mario\_grgic</author>
	<datestamp>1264517400000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext><p>Both Mail and Finder will warn you that what you are opening has been downloaded from the internet and ask you to confirm you want to execute it.</p><p>Each file you download is put into a quarantine and your answer to the question is recorded.</p><p>You generally don't have to worry about opening non-executable files like images, zip files, video files etc. But, you of course, do have to worry about shell scripts, apple scripts, applications and application documents that contain java script (like PDF if you use Adobe reader which almost no one on a Mac does, since Preview app is so much better and it's there on each Mac)</p><p>Any savvy user should already know all these things no matter what platform they use.</p></htmltext>
<tokenext>Both Mail and Finder will warn you that what you are opening has been downloaded from the internet and ask you to confirm you want to execute it.Each file you download is put into a quarantine and your answer to the question is recorded.You generally do n't have to worry about opening non-executable files like images , zip files , video files etc .
But , you of course , do have to worry about shell scripts , apple scripts , applications and application documents that contain java script ( like PDF if you use Adobe reader which almost no one on a Mac does , since Preview app is so much better and it 's there on each Mac ) Any savvy user should already know all these things no matter what platform they use .</tokentext>
<sentencetext>Both Mail and Finder will warn you that what you are opening has been downloaded from the internet and ask you to confirm you want to execute it.Each file you download is put into a quarantine and your answer to the question is recorded.You generally don't have to worry about opening non-executable files like images, zip files, video files etc.
But, you of course, do have to worry about shell scripts, apple scripts, applications and application documents that contain java script (like PDF if you use Adobe reader which almost no one on a Mac does, since Preview app is so much better and it's there on each Mac)Any savvy user should already know all these things no matter what platform they use.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901222</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901878</id>
	<title>Re:With great freedom comes great resposibility</title>
	<author>arb phd slp</author>
	<datestamp>1264504260000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>When 20/20 took a look at dangerous "exploding" trucks, it was found that if you put a small amount of explosive near the crash area, that you could indeed cause a truck to explode in an accident. But does that mean that the truck company should be found at fault for a usage scenario that is not supported?</p></div><p>Point taken, but to be fair that was NBC's Dateline that did that, not 20/20.</p></div>
	</htmltext>
<tokenext>When 20/20 took a look at dangerous " exploding " trucks , it was found that if you put a small amount of explosive near the crash area , that you could indeed cause a truck to explode in an accident .
But does that mean that the truck company should be found at fault for a usage scenario that is not supported ? Point taken , but to be fair that was NBC 's Dateline that did that , not 20/20 .</tokentext>
<sentencetext>When 20/20 took a look at dangerous "exploding" trucks, it was found that if you put a small amount of explosive near the crash area, that you could indeed cause a truck to explode in an accident.
But does that mean that the truck company should be found at fault for a usage scenario that is not supported?Point taken, but to be fair that was NBC's Dateline that did that, not 20/20.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901268</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901640</id>
	<title>Re:With great freedom comes great resposibility</title>
	<author>x2A</author>
	<datestamp>1264500660000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p><i>"that users would want to use software outside of their control"</i></p><p>hahaha, it's funny because it's apple! Hardwired batteries, single sheet aluminium cases, Apple don't like letting you into -anything-, control will be theirs... somewhere in rural America (probably) is a giant warehouse, filled with giant crates, which in turn are filled with all the second buttons from the mice, being looked at by "top men". And you thought they were designed with only one button, HA shows what you know. They just only give you one, and keep the other. Rumour has it that from time to time, people in the warehouse will select a few of the second mouse buttons at random, lay them out on the floor, and play Dance Dance Revolution on 'em.</p></htmltext>
<tokenext>" that users would want to use software outside of their control " hahaha , it 's funny because it 's apple !
Hardwired batteries , single sheet aluminium cases , Apple do n't like letting you into -anything- , control will be theirs... somewhere in rural America ( probably ) is a giant warehouse , filled with giant crates , which in turn are filled with all the second buttons from the mice , being looked at by " top men " .
And you thought they were designed with only one button , HA shows what you know .
They just only give you one , and keep the other .
Rumour has it that from time to time , people in the warehouse will select a few of the second mouse buttons at random , lay them out on the floor , and play Dance Dance Revolution on 'em .</tokentext>
<sentencetext>"that users would want to use software outside of their control"hahaha, it's funny because it's apple!
Hardwired batteries, single sheet aluminium cases, Apple don't like letting you into -anything-, control will be theirs... somewhere in rural America (probably) is a giant warehouse, filled with giant crates, which in turn are filled with all the second buttons from the mice, being looked at by "top men".
And you thought they were designed with only one button, HA shows what you know.
They just only give you one, and keep the other.
Rumour has it that from time to time, people in the warehouse will select a few of the second mouse buttons at random, lay them out on the floor, and play Dance Dance Revolution on 'em.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901516</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901550</id>
	<title>Frist prsot!!</title>
	<author>Anonymous</author>
	<datestamp>1264499220000</datestamp>
	<modclass>Offtopic</modclass>
	<modscore>-1</modscore>
	<htmltext><A HREF="http://goat.cx/" title="goat.cx" rel="nofollow">[n3ro-online.org].</a> [goat.cx]</htmltext>
<tokenext>[ n3ro-online.org ] .
[ goat.cx ]</tokentext>
<sentencetext>[n3ro-online.org].
[goat.cx]</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901222</id>
	<title>So, avoid pirated Mac software...</title>
	<author>Anonymous</author>
	<datestamp>1264538100000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>4</modscore>
	<htmltext><p>...and let Software Update do it's thing with Security Updates.</p><p>Don't go online as Root, and really try not to open email attachments that claim to be "Nude Photos of (insert female athlete name here)"</p><p>Really, how hard is that?</p></htmltext>
<tokenext>...and let Software Update do it 's thing with Security Updates.Do n't go online as Root , and really try not to open email attachments that claim to be " Nude Photos of ( insert female athlete name here ) " Really , how hard is that ?</tokentext>
<sentencetext>...and let Software Update do it's thing with Security Updates.Don't go online as Root, and really try not to open email attachments that claim to be "Nude Photos of (insert female athlete name here)"Really, how hard is that?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30908058</id>
	<title>Re:Apple's DRM seems to be the main problem</title>
	<author>Anonymous</author>
	<datestamp>1264535700000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext>&gt;&gt;If Apple didn't put such draconian limits....<br> <br>

Really, just shut the fuck up, douche.</htmltext>
<tokenext>&gt; &gt; If Apple did n't put such draconian limits... . Really , just shut the fuck up , douche .</tokentext>
<sentencetext>&gt;&gt;If Apple didn't put such draconian limits.... 

Really, just shut the fuck up, douche.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901922</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30902360</id>
	<title>Jailbroken = not Apple's responsibility</title>
	<author>Anonymous</author>
	<datestamp>1264510260000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I would think that would be obvious.</p></htmltext>
<tokenext>I would think that would be obvious .</tokentext>
<sentencetext>I would think that would be obvious.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30902458</id>
	<title>Re:Apple's DRM seems to be the main problem</title>
	<author>Anonymous</author>
	<datestamp>1264511100000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>You're an idiot.</p></htmltext>
<tokenext>You 're an idiot .</tokentext>
<sentencetext>You're an idiot.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901922</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901282</id>
	<title>join the party</title>
	<author>doood</author>
	<datestamp>1264538880000</datestamp>
	<modclass>Redundant</modclass>
	<modscore>-1</modscore>
	<htmltext><p>Seriously,</p><p>It's sad to see OS X joining the rest of the group.</p></htmltext>
<tokenext>Seriously,It 's sad to see OS X joining the rest of the group .</tokentext>
<sentencetext>Seriously,It's sad to see OS X joining the rest of the group.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901268</id>
	<title>With great freedom comes great resposibility</title>
	<author>BadAnalogyGuy</author>
	<datestamp>1264538640000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Should it be any surprise that unmoderated software could introduce security vulnerabilities? All a CPU does is execute instructions, so "jailbreaking" a phone just gives you the opportunity to run more software which may contain malicious payloads.</p><p>When 20/20 took a look at dangerous "exploding" trucks, it was found that if you put a small amount of explosive near the crash area, that you could indeed cause a truck to explode in an accident. But does that mean that the truck company should be found at fault for a usage scenario that is not supported?</p><p>Analyze the security of this phone in terms of its default use. It burns up (literally), it causes network packet flooding, and does a bunch of other unwanted things, but don't blame it for something that its users do in direct violation of their TOS.</p></htmltext>
<tokenext>Should it be any surprise that unmoderated software could introduce security vulnerabilities ?
All a CPU does is execute instructions , so " jailbreaking " a phone just gives you the opportunity to run more software which may contain malicious payloads.When 20/20 took a look at dangerous " exploding " trucks , it was found that if you put a small amount of explosive near the crash area , that you could indeed cause a truck to explode in an accident .
But does that mean that the truck company should be found at fault for a usage scenario that is not supported ? Analyze the security of this phone in terms of its default use .
It burns up ( literally ) , it causes network packet flooding , and does a bunch of other unwanted things , but do n't blame it for something that its users do in direct violation of their TOS .</tokentext>
<sentencetext>Should it be any surprise that unmoderated software could introduce security vulnerabilities?
All a CPU does is execute instructions, so "jailbreaking" a phone just gives you the opportunity to run more software which may contain malicious payloads.When 20/20 took a look at dangerous "exploding" trucks, it was found that if you put a small amount of explosive near the crash area, that you could indeed cause a truck to explode in an accident.
But does that mean that the truck company should be found at fault for a usage scenario that is not supported?Analyze the security of this phone in terms of its default use.
It burns up (literally), it causes network packet flooding, and does a bunch of other unwanted things, but don't blame it for something that its users do in direct violation of their TOS.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901516</id>
	<title>Re:With great freedom comes great resposibility</title>
	<author>EzInKy</author>
	<datestamp>1264498800000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p><i>Should it be any surprise that unmoderated software could introduce security vulnerabilities? All a CPU does is execute instructions, so "jailbreaking" a phone just gives you the opportunity to run more software which may contain malicious payloads.</i></p><p>Apple should have anticipated that users would want to use software outside of their control and provided detailed instructions on how to do so in a safe manor.</p></htmltext>
<tokenext>Should it be any surprise that unmoderated software could introduce security vulnerabilities ?
All a CPU does is execute instructions , so " jailbreaking " a phone just gives you the opportunity to run more software which may contain malicious payloads.Apple should have anticipated that users would want to use software outside of their control and provided detailed instructions on how to do so in a safe manor .</tokentext>
<sentencetext>Should it be any surprise that unmoderated software could introduce security vulnerabilities?
All a CPU does is execute instructions, so "jailbreaking" a phone just gives you the opportunity to run more software which may contain malicious payloads.Apple should have anticipated that users would want to use software outside of their control and provided detailed instructions on how to do so in a safe manor.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901268</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30909326</id>
	<title>Re:With great freedom comes great resposibility</title>
	<author>BitZtream</author>
	<datestamp>1264498080000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>How about you don't jail break it if you're a 'fucking moron'?  Or in your case, just don't buy one cause you can't understand the basic premise behind both of those statements.</p><p>It isn't open and requires jailbreaking to prevent 'fucking morons' from causing problems.</p><p>So a 'fucking moron' who doesn't know what they hell he/she is doing shouldn't jailbreak it, and those are the people who get exploited, which are the people 'who shouldn't jailbreak it'</p><p>This is the problem with todays hacks.  Hackers forgot the point.  Now days its all about getting popular, not really street cred, like it used to be.  Now they make a freaking GUI app to do all the work, which instantly cuts out the check that prevents 'fucking morons' from damaging their phones because now any 'fucking moron' can do it without any knowledge about WHAT they are actually doing.  They then proceed to go to a freshly installed app, click the 'install all' button basically because they think that their Ubuntu desktop machine made them a leet hax0rs who knows everything about computing.</p><p>No, people don't talk about jailbreaking other things because its a term specific to the iPhone.  Partly because very few people care about other devices in this way, but I've certainly hacked the firmware on my WinMo phones to do other things the carrier didn't want me to do, I know of people who've hacked Nokia smartphones for various purposes.</p><p>More important however, is that your 5800 has never had a virus<nobr> <wbr></nobr>...  You know why?  The number of them in use is so small that NO ONE gives a shit about it.  No one ever hacked any of my old cell phones either, because they weren't the fastest growing device on the market, nor did they have anything a hacker could do to them.</p><p>Take any of your statements without any knowledge about the subject matter and they make sense, but as soon as you have even the slightest clue about the subject manner your post quickly looks like something submitted by a 'fucking moron' who just happens to own a 5800 and thinks they know wtf they are talking about.</p></htmltext>
<tokenext>How about you do n't jail break it if you 're a 'fucking moron ' ?
Or in your case , just do n't buy one cause you ca n't understand the basic premise behind both of those statements.It is n't open and requires jailbreaking to prevent 'fucking morons ' from causing problems.So a 'fucking moron ' who does n't know what they hell he/she is doing should n't jailbreak it , and those are the people who get exploited , which are the people 'who should n't jailbreak it'This is the problem with todays hacks .
Hackers forgot the point .
Now days its all about getting popular , not really street cred , like it used to be .
Now they make a freaking GUI app to do all the work , which instantly cuts out the check that prevents 'fucking morons ' from damaging their phones because now any 'fucking moron ' can do it without any knowledge about WHAT they are actually doing .
They then proceed to go to a freshly installed app , click the 'install all ' button basically because they think that their Ubuntu desktop machine made them a leet hax0rs who knows everything about computing.No , people do n't talk about jailbreaking other things because its a term specific to the iPhone .
Partly because very few people care about other devices in this way , but I 've certainly hacked the firmware on my WinMo phones to do other things the carrier did n't want me to do , I know of people who 've hacked Nokia smartphones for various purposes.More important however , is that your 5800 has never had a virus ... You know why ?
The number of them in use is so small that NO ONE gives a shit about it .
No one ever hacked any of my old cell phones either , because they were n't the fastest growing device on the market , nor did they have anything a hacker could do to them.Take any of your statements without any knowledge about the subject matter and they make sense , but as soon as you have even the slightest clue about the subject manner your post quickly looks like something submitted by a 'fucking moron ' who just happens to own a 5800 and thinks they know wtf they are talking about .</tokentext>
<sentencetext>How about you don't jail break it if you're a 'fucking moron'?
Or in your case, just don't buy one cause you can't understand the basic premise behind both of those statements.It isn't open and requires jailbreaking to prevent 'fucking morons' from causing problems.So a 'fucking moron' who doesn't know what they hell he/she is doing shouldn't jailbreak it, and those are the people who get exploited, which are the people 'who shouldn't jailbreak it'This is the problem with todays hacks.
Hackers forgot the point.
Now days its all about getting popular, not really street cred, like it used to be.
Now they make a freaking GUI app to do all the work, which instantly cuts out the check that prevents 'fucking morons' from damaging their phones because now any 'fucking moron' can do it without any knowledge about WHAT they are actually doing.
They then proceed to go to a freshly installed app, click the 'install all' button basically because they think that their Ubuntu desktop machine made them a leet hax0rs who knows everything about computing.No, people don't talk about jailbreaking other things because its a term specific to the iPhone.
Partly because very few people care about other devices in this way, but I've certainly hacked the firmware on my WinMo phones to do other things the carrier didn't want me to do, I know of people who've hacked Nokia smartphones for various purposes.More important however, is that your 5800 has never had a virus ...  You know why?
The number of them in use is so small that NO ONE gives a shit about it.
No one ever hacked any of my old cell phones either, because they weren't the fastest growing device on the market, nor did they have anything a hacker could do to them.Take any of your statements without any knowledge about the subject matter and they make sense, but as soon as you have even the slightest clue about the subject manner your post quickly looks like something submitted by a 'fucking moron' who just happens to own a 5800 and thinks they know wtf they are talking about.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30903166</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30905684</id>
	<title>Re:so what they are saying is...</title>
	<author>BrokenHalo</author>
	<datestamp>1264526220000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><i>so what they are saying is... don't jaibreak your iphone</i> <br> <br>
I think I'll just settle for not buying one.<nobr> <wbr></nobr>;-)</htmltext>
<tokenext>so what they are saying is... do n't jaibreak your iphone I think I 'll just settle for not buying one .
; - )</tokentext>
<sentencetext>so what they are saying is... don't jaibreak your iphone  
I think I'll just settle for not buying one.
;-)</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901874</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901486</id>
	<title>my summary of the white/sales paper - fluff mostly</title>
	<author>prawn\_narwp</author>
	<datestamp>1264498260000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>4</modscore>
	<htmltext><p>This is basically 7 total pages:</p><p>* first couple pages on installing bitorrent'd software<br>* Page 4 and 5 about people who installed openssh on their jailbroken iphones and didn't change their passwords<br>* last page has citations back to their own blog</p><p>The meat of it is about PDF, Java -- surely those have a more widespread effect right? But they spend a lot less words on those topics. Note that all the visuals have to do with the stupid ssh-admin-password and bittorent'd malware.</p><p>Skip to the concluding paragraph -- they just have to emphasize the iphone again.</p><p>I was going to say "I declare this posting unfit for Slashdot" but the good I see is that we can pick it apart to sort out the fluff.</p><p>My rating system on severity overall on the entire population of apple products:</p><p>1) pdf/java (5 stars)<br>2) I-enabled-ssh-w/o-a-password (1 star - you're fault for being a retard)<br>3) Charles Miller iphone vuln (5 stars when it wasn't patched)</p></htmltext>
<tokenext>This is basically 7 total pages : * first couple pages on installing bitorrent 'd software * Page 4 and 5 about people who installed openssh on their jailbroken iphones and did n't change their passwords * last page has citations back to their own blogThe meat of it is about PDF , Java -- surely those have a more widespread effect right ?
But they spend a lot less words on those topics .
Note that all the visuals have to do with the stupid ssh-admin-password and bittorent 'd malware.Skip to the concluding paragraph -- they just have to emphasize the iphone again.I was going to say " I declare this posting unfit for Slashdot " but the good I see is that we can pick it apart to sort out the fluff.My rating system on severity overall on the entire population of apple products : 1 ) pdf/java ( 5 stars ) 2 ) I-enabled-ssh-w/o-a-password ( 1 star - you 're fault for being a retard ) 3 ) Charles Miller iphone vuln ( 5 stars when it was n't patched )</tokentext>
<sentencetext>This is basically 7 total pages:* first couple pages on installing bitorrent'd software* Page 4 and 5 about people who installed openssh on their jailbroken iphones and didn't change their passwords* last page has citations back to their own blogThe meat of it is about PDF, Java -- surely those have a more widespread effect right?
But they spend a lot less words on those topics.
Note that all the visuals have to do with the stupid ssh-admin-password and bittorent'd malware.Skip to the concluding paragraph -- they just have to emphasize the iphone again.I was going to say "I declare this posting unfit for Slashdot" but the good I see is that we can pick it apart to sort out the fluff.My rating system on severity overall on the entire population of apple products:1) pdf/java (5 stars)2) I-enabled-ssh-w/o-a-password (1 star - you're fault for being a retard)3) Charles Miller iphone vuln (5 stars when it wasn't patched)</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30902162</id>
	<title>Talking through their hat since 2004</title>
	<author>argent</author>
	<datestamp>1264507560000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>3</modscore>
	<htmltext><p>Back in 2004 Intego's big complaint about the Mac was that because it's based on UNIX, if you could get it to execute a shell script you could do anything on the computer, and that Applescript wasn't sandboxed. They never noticed that the same was true of CMD.EXE and VBscript on Windows, DCL on VMS, and every other native scripting environment on every OS, ever, anywhere.</p><p>Intego's business model appears to be FUD.</p></htmltext>
<tokenext>Back in 2004 Intego 's big complaint about the Mac was that because it 's based on UNIX , if you could get it to execute a shell script you could do anything on the computer , and that Applescript was n't sandboxed .
They never noticed that the same was true of CMD.EXE and VBscript on Windows , DCL on VMS , and every other native scripting environment on every OS , ever , anywhere.Intego 's business model appears to be FUD .</tokentext>
<sentencetext>Back in 2004 Intego's big complaint about the Mac was that because it's based on UNIX, if you could get it to execute a shell script you could do anything on the computer, and that Applescript wasn't sandboxed.
They never noticed that the same was true of CMD.EXE and VBscript on Windows, DCL on VMS, and every other native scripting environment on every OS, ever, anywhere.Intego's business model appears to be FUD.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901544</id>
	<title>Re:So, avoid pirated Mac software...</title>
	<author>Anonymous</author>
	<datestamp>1264499160000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>5</modscore>
	<htmltext>So you basically said what PC users do everyday (the ones that don't ever get viruses)...</htmltext>
<tokenext>So you basically said what PC users do everyday ( the ones that do n't ever get viruses ) .. .</tokentext>
<sentencetext>So you basically said what PC users do everyday (the ones that don't ever get viruses)...</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901222</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30909628</id>
	<title>Re:With great freedom comes great resposibility</title>
	<author>ceoyoyo</author>
	<datestamp>1264499280000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>You're right.  On Android they call it "rooting."</p><p>It's not necessary to not jailbreak your phone.  Just remember to set your password when you install SSH.  Same lesson applies to any machine you install SSH on.</p></htmltext>
<tokenext>You 're right .
On Android they call it " rooting .
" It 's not necessary to not jailbreak your phone .
Just remember to set your password when you install SSH .
Same lesson applies to any machine you install SSH on .</tokentext>
<sentencetext>You're right.
On Android they call it "rooting.
"It's not necessary to not jailbreak your phone.
Just remember to set your password when you install SSH.
Same lesson applies to any machine you install SSH on.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30903166</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901520</id>
	<title>cue the iZombies</title>
	<author>Anonymous</author>
	<datestamp>1264498860000</datestamp>
	<modclass>None</modclass>
	<modscore>-1</modscore>
	<htmltext><p>this article foolishly implies that Macs could be less than absolutely perfect.  It fails to adequately explain why any potential problem a Mac might possibly have A: is actually a feature B: is actually your own fault or C: doesn't matter because Macs "just work".</p><p>blathering fanboy postings in 3.. 2... 1...</p></htmltext>
<tokenext>this article foolishly implies that Macs could be less than absolutely perfect .
It fails to adequately explain why any potential problem a Mac might possibly have A : is actually a feature B : is actually your own fault or C : does n't matter because Macs " just work " .blathering fanboy postings in 3.. 2... 1.. .</tokentext>
<sentencetext>this article foolishly implies that Macs could be less than absolutely perfect.
It fails to adequately explain why any potential problem a Mac might possibly have A: is actually a feature B: is actually your own fault or C: doesn't matter because Macs "just work".blathering fanboy postings in 3.. 2... 1...</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901660</id>
	<title>Re:So, avoid pirated Mac software...</title>
	<author>Anonymous</author>
	<datestamp>1264500840000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p><div class="quote"><p>Don't go online as Root, and really try not to open email attachments that claim to be "Nude Photos of (insert female athlete name here)"</p></div><p>Not looking at pictures of naked females<nobr> <wbr></nobr>... easy? Are you a eunuch?</p></div>
	</htmltext>
<tokenext>Do n't go online as Root , and really try not to open email attachments that claim to be " Nude Photos of ( insert female athlete name here ) " Not looking at pictures of naked females ... easy ? Are you a eunuch ?</tokentext>
<sentencetext>Don't go online as Root, and really try not to open email attachments that claim to be "Nude Photos of (insert female athlete name here)"Not looking at pictures of naked females ... easy? Are you a eunuch?
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901222</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901814</id>
	<title>Re:my summary of the white/sales paper - fluff mos</title>
	<author>x2A</author>
	<datestamp>1264503120000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><i>"* last page has citations back to their own blog"</i></p><p>*lol* it's like when some breaking story (ie, any story) hits the news, but perhaps controversial or unconfirmed, and they say "it has been reported that <i>blah blah blah</i>" and then you flick over the channel and they're saying "<i>blah blah</i> has reported that <i>blah blah blah</i>", and it doesn't take long to notice that all people are telling you is that people are telling you what they're telling you.</p><p>Someone somewhere get tipped off about some rumour, phones someone he knows in another network says "have you heard about <i>blah blah</i>" and they have, as they received the same tip off. So guy on other end of phone mouths over too his boss saying "it's <i>whatshisname</i> over at <i>thingy</i>, they're going with the <i>blah blah</i> story" so the boss says "we'll go with it, put it on the 10 bullitin after the bit about the elephant who only has a monkey sized head". "Yeah we're going with the story" he says back, so now the first person says to his boss "yeah they're already going with it" and so gets it on their 10 o'clock bullitin too.</p><p>I can prove that it happens - check out the replies to <a href="http://apple.slashdot.org/comments.pl?sid=1524018&amp;cid=30901486" title="slashdot.org">this comment here</a> [slashdot.org]</p></htmltext>
<tokenext>" * last page has citations back to their own blog " * lol * it 's like when some breaking story ( ie , any story ) hits the news , but perhaps controversial or unconfirmed , and they say " it has been reported that blah blah blah " and then you flick over the channel and they 're saying " blah blah has reported that blah blah blah " , and it does n't take long to notice that all people are telling you is that people are telling you what they 're telling you.Someone somewhere get tipped off about some rumour , phones someone he knows in another network says " have you heard about blah blah " and they have , as they received the same tip off .
So guy on other end of phone mouths over too his boss saying " it 's whatshisname over at thingy , they 're going with the blah blah story " so the boss says " we 'll go with it , put it on the 10 bullitin after the bit about the elephant who only has a monkey sized head " .
" Yeah we 're going with the story " he says back , so now the first person says to his boss " yeah they 're already going with it " and so gets it on their 10 o'clock bullitin too.I can prove that it happens - check out the replies to this comment here [ slashdot.org ]</tokentext>
<sentencetext>"* last page has citations back to their own blog"*lol* it's like when some breaking story (ie, any story) hits the news, but perhaps controversial or unconfirmed, and they say "it has been reported that blah blah blah" and then you flick over the channel and they're saying "blah blah has reported that blah blah blah", and it doesn't take long to notice that all people are telling you is that people are telling you what they're telling you.Someone somewhere get tipped off about some rumour, phones someone he knows in another network says "have you heard about blah blah" and they have, as they received the same tip off.
So guy on other end of phone mouths over too his boss saying "it's whatshisname over at thingy, they're going with the blah blah story" so the boss says "we'll go with it, put it on the 10 bullitin after the bit about the elephant who only has a monkey sized head".
"Yeah we're going with the story" he says back, so now the first person says to his boss "yeah they're already going with it" and so gets it on their 10 o'clock bullitin too.I can prove that it happens - check out the replies to this comment here [slashdot.org]</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901486</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901324</id>
	<title>Re:So, avoid pirated Mac software...</title>
	<author>Anonymous</author>
	<datestamp>1264539240000</datestamp>
	<modclass>Offtopic</modclass>
	<modscore>-1</modscore>
	<htmltext><p>Don't leave your Mac outside if you learn that horses have escaped from stables in Troy. It's the biggest risk.</p></htmltext>
<tokenext>Do n't leave your Mac outside if you learn that horses have escaped from stables in Troy .
It 's the biggest risk .</tokentext>
<sentencetext>Don't leave your Mac outside if you learn that horses have escaped from stables in Troy.
It's the biggest risk.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901222</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901828</id>
	<title>WTF, people.</title>
	<author>Anonymous</author>
	<datestamp>1264503420000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext><p>The ability to jailbreak <b> <i>is</i> </b> a security hole.  Last I knew the techniques people use are <b>remote code execution</b>.</p><p>For example as I recall the 1st gen jailbreak was to get a specially crafted TIFF file that exploited a buffer overflow when a page was loaded in Safari.  Stop and think about that for a minute.  This is the kind of behavior you <b>don't</b> want to be possible.  Yet in the reality distortion field, it's a great thing suddenly.  Users are totally unconcerned about this.</p><p>I'm not sure if the exploit mechanism has changed since then, but...  Personally, I stopped paying attention to iPhone when I witnessed that.</p></htmltext>
<tokenext>The ability to jailbreak is a security hole .
Last I knew the techniques people use are remote code execution.For example as I recall the 1st gen jailbreak was to get a specially crafted TIFF file that exploited a buffer overflow when a page was loaded in Safari .
Stop and think about that for a minute .
This is the kind of behavior you do n't want to be possible .
Yet in the reality distortion field , it 's a great thing suddenly .
Users are totally unconcerned about this.I 'm not sure if the exploit mechanism has changed since then , but... Personally , I stopped paying attention to iPhone when I witnessed that .</tokentext>
<sentencetext>The ability to jailbreak  is  a security hole.
Last I knew the techniques people use are remote code execution.For example as I recall the 1st gen jailbreak was to get a specially crafted TIFF file that exploited a buffer overflow when a page was loaded in Safari.
Stop and think about that for a minute.
This is the kind of behavior you don't want to be possible.
Yet in the reality distortion field, it's a great thing suddenly.
Users are totally unconcerned about this.I'm not sure if the exploit mechanism has changed since then, but...  Personally, I stopped paying attention to iPhone when I witnessed that.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901922</id>
	<title>Apple's DRM seems to be the main problem</title>
	<author>DrXym</author>
	<datestamp>1264504980000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>3</modscore>
	<htmltext>If Apple didn't put such draconian limits on what a person could do with their own property, perhaps there wouldn't be the need to "jailbreak" it.</htmltext>
<tokenext>If Apple did n't put such draconian limits on what a person could do with their own property , perhaps there would n't be the need to " jailbreak " it .</tokentext>
<sentencetext>If Apple didn't put such draconian limits on what a person could do with their own property, perhaps there wouldn't be the need to "jailbreak" it.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901382</id>
	<title>bad karma</title>
	<author>Anonymous</author>
	<datestamp>1264496760000</datestamp>
	<modclass>Troll</modclass>
	<modscore>-1</modscore>
	<htmltext>i have bad karam well fuck you slashdot i only ever bother loggin in and posting about 5 times you are all wankers anyways wooo HOWS MY KARMA NOW</htmltext>
<tokenext>i have bad karam well fuck you slashdot i only ever bother loggin in and posting about 5 times you are all wankers anyways wooo HOWS MY KARMA NOW</tokentext>
<sentencetext>i have bad karam well fuck you slashdot i only ever bother loggin in and posting about 5 times you are all wankers anyways wooo HOWS MY KARMA NOW</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30904460</id>
	<title>Re:WTF, people.</title>
	<author>TJamieson</author>
	<datestamp>1264521780000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>2</modscore>
	<htmltext><p>FWIW, this has changed about jailbreaking. What you said used to be true on the 1.x series of iPhone software, where everything always ran as root. Therefore, a hole in libTIFF lead to (remote) root code execution. Starting with the 2.x series, Apple finally forced the restricted user account named Mobile to be used instead of root. That made it so now a libTIFF exploit *also* would require a privilege escalation exploit rolled inside; made things much harder. Starting around the 2.x software, the new way to jailbreak is by exploiting Apple's software update mechanism built into each device (Google: iBoot). This means that to jailbreak newer software/devices, one is required to attach the device to the computer first; the exploit is then done via USB.</p></htmltext>
<tokenext>FWIW , this has changed about jailbreaking .
What you said used to be true on the 1.x series of iPhone software , where everything always ran as root .
Therefore , a hole in libTIFF lead to ( remote ) root code execution .
Starting with the 2.x series , Apple finally forced the restricted user account named Mobile to be used instead of root .
That made it so now a libTIFF exploit * also * would require a privilege escalation exploit rolled inside ; made things much harder .
Starting around the 2.x software , the new way to jailbreak is by exploiting Apple 's software update mechanism built into each device ( Google : iBoot ) .
This means that to jailbreak newer software/devices , one is required to attach the device to the computer first ; the exploit is then done via USB .</tokentext>
<sentencetext>FWIW, this has changed about jailbreaking.
What you said used to be true on the 1.x series of iPhone software, where everything always ran as root.
Therefore, a hole in libTIFF lead to (remote) root code execution.
Starting with the 2.x series, Apple finally forced the restricted user account named Mobile to be used instead of root.
That made it so now a libTIFF exploit *also* would require a privilege escalation exploit rolled inside; made things much harder.
Starting around the 2.x software, the new way to jailbreak is by exploiting Apple's software update mechanism built into each device (Google: iBoot).
This means that to jailbreak newer software/devices, one is required to attach the device to the computer first; the exploit is then done via USB.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901828</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30909660</id>
	<title>Re:With great freedom comes great resposibility</title>
	<author>jo\_ham</author>
	<datestamp>1264499400000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>You DO NOT need to jailbreak to use tethering. My un-jailbroken iPhone tethers just fine.</p><p>You also don;t hear about it in any other context because no other phone is in the same sort of position - a popular device that doesn't do quite what some geeks want, with enough following to change. There are plenty of phones that are locked up just as tightly as the iPhone, with features crippled and controlled (but mainly at the behest of the carrier, not the owner of the App store), but they don;t get much press because people don;t really care about them, or they choose a different phone.</p><p>The iPhone is the first one to come along where people still want it, and are willing to work around the restrictions that are all clearly visible before you buy it. With the availability of Android phones, the market for jailbreaking will probably decrease, since the majority seem to want what Droid has to offer - which is great, it;s just not what is offered by default with the iPhone.</p></htmltext>
<tokenext>You DO NOT need to jailbreak to use tethering .
My un-jailbroken iPhone tethers just fine.You also don ; t hear about it in any other context because no other phone is in the same sort of position - a popular device that does n't do quite what some geeks want , with enough following to change .
There are plenty of phones that are locked up just as tightly as the iPhone , with features crippled and controlled ( but mainly at the behest of the carrier , not the owner of the App store ) , but they don ; t get much press because people don ; t really care about them , or they choose a different phone.The iPhone is the first one to come along where people still want it , and are willing to work around the restrictions that are all clearly visible before you buy it .
With the availability of Android phones , the market for jailbreaking will probably decrease , since the majority seem to want what Droid has to offer - which is great , it ; s just not what is offered by default with the iPhone .</tokentext>
<sentencetext>You DO NOT need to jailbreak to use tethering.
My un-jailbroken iPhone tethers just fine.You also don;t hear about it in any other context because no other phone is in the same sort of position - a popular device that doesn't do quite what some geeks want, with enough following to change.
There are plenty of phones that are locked up just as tightly as the iPhone, with features crippled and controlled (but mainly at the behest of the carrier, not the owner of the App store), but they don;t get much press because people don;t really care about them, or they choose a different phone.The iPhone is the first one to come along where people still want it, and are willing to work around the restrictions that are all clearly visible before you buy it.
With the availability of Android phones, the market for jailbreaking will probably decrease, since the majority seem to want what Droid has to offer - which is great, it;s just not what is offered by default with the iPhone.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30903166</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30913516</id>
	<title>Re:With great freedom comes great resposibility</title>
	<author>Kitkoan</author>
	<datestamp>1264526460000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p><div class="quote"><p>As for "applications that Apple doesn't [sic] like", you must mean malware, trojans, and data theft mechanisms. If you want to run those by all means do so. You could save yourself some trouble and just write your date of birth and credit card numbers on a placard and hang that around your neck when you head to the mall.</p></div><p>Or it could be just about every app listed on Cydia <a href="http://cydia.saurik.com/" title="saurik.com" rel="nofollow">http://cydia.saurik.com/</a> [saurik.com]<nobr> <wbr></nobr>.... which are no malware, trojans or data theft mechanisms... though you can get data theft ones from the app store: <a href="http://yro.slashdot.org/story/09/09/29/1933252/Retrievable-iPhone-Numbers-Raise-Privacy-Issue?art\_pos=34" title="slashdot.org" rel="nofollow">http://yro.slashdot.org/story/09/09/29/1933252/Retrievable-iPhone-Numbers-Raise-Privacy-Issue?art\_pos=34</a> [slashdot.org]</p></div>
	</htmltext>
<tokenext>As for " applications that Apple does n't [ sic ] like " , you must mean malware , trojans , and data theft mechanisms .
If you want to run those by all means do so .
You could save yourself some trouble and just write your date of birth and credit card numbers on a placard and hang that around your neck when you head to the mall.Or it could be just about every app listed on Cydia http : //cydia.saurik.com/ [ saurik.com ] .... which are no malware , trojans or data theft mechanisms... though you can get data theft ones from the app store : http : //yro.slashdot.org/story/09/09/29/1933252/Retrievable-iPhone-Numbers-Raise-Privacy-Issue ? art \ _pos = 34 [ slashdot.org ]</tokentext>
<sentencetext>As for "applications that Apple doesn't [sic] like", you must mean malware, trojans, and data theft mechanisms.
If you want to run those by all means do so.
You could save yourself some trouble and just write your date of birth and credit card numbers on a placard and hang that around your neck when you head to the mall.Or it could be just about every app listed on Cydia http://cydia.saurik.com/ [saurik.com] .... which are no malware, trojans or data theft mechanisms... though you can get data theft ones from the app store: http://yro.slashdot.org/story/09/09/29/1933252/Retrievable-iPhone-Numbers-Raise-Privacy-Issue?art\_pos=34 [slashdot.org]
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30905750</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30907534</id>
	<title>Software updates,activations and anon statistics</title>
	<author>Ilgaz</author>
	<datestamp>1264533720000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>So, original Adobe CS4 user who paid more than $1000 and gave his credit card number, home address and telephone should be protected from "evil Adobe" from checking updates or trying to figure which parts of software is used anonymously?</p><p>Well, Intego and couple of other companies offer a application firewall but, obviously if you use original/activation system software, it will fail to work if it can't access to net. Solution is GIMP but, it would be a bit unrealistic.</p></htmltext>
<tokenext>So , original Adobe CS4 user who paid more than $ 1000 and gave his credit card number , home address and telephone should be protected from " evil Adobe " from checking updates or trying to figure which parts of software is used anonymously ? Well , Intego and couple of other companies offer a application firewall but , obviously if you use original/activation system software , it will fail to work if it ca n't access to net .
Solution is GIMP but , it would be a bit unrealistic .</tokentext>
<sentencetext>So, original Adobe CS4 user who paid more than $1000 and gave his credit card number, home address and telephone should be protected from "evil Adobe" from checking updates or trying to figure which parts of software is used anonymously?Well, Intego and couple of other companies offer a application firewall but, obviously if you use original/activation system software, it will fail to work if it can't access to net.
Solution is GIMP but, it would be a bit unrealistic.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901478</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901484</id>
	<title>Re:bad karma</title>
	<author>pipatron</author>
	<datestamp>1264498200000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>See, that's why it's called karma. Your previous posts clearly shows that you're an immature idiot without anything to say except to waste everyones time.</htmltext>
<tokenext>See , that 's why it 's called karma .
Your previous posts clearly shows that you 're an immature idiot without anything to say except to waste everyones time .</tokentext>
<sentencetext>See, that's why it's called karma.
Your previous posts clearly shows that you're an immature idiot without anything to say except to waste everyones time.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901382</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30907434</id>
	<title>You mean OSXWindows?</title>
	<author>Anonymous</author>
	<datestamp>1264533300000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Some fan guy modded you flamebait but, I guess you mean installing boot camp or a virtual machine (hypervisor) and running it just like OS X, without antivirus/firewall and giving it access to OS X file structure.</p><p>IMHO Apple made a huge mistake by allowing (SL Bootcamp) Windows to see (read only though) OS X drives. That is not a favour, it is a huge security risk especially for Mac only people not knowing the extent of Windows threats/trojans/data leakage.</p><p>Fix? "My Computer", "Manage", "Disk Management", remove drive letter of the OS X drives. At least 99.9999 malware which isn't very modern will fail to find the personal files to steal.</p><p>To the "my virtual machine resets itself each boot" guys: If some real mean thing hits you, have fun explaining why your IP/computer was involved in some child porn distribution network "until it rebooted". Run some antivirus, it is NOT Mac once it runs Windows.</p></htmltext>
<tokenext>Some fan guy modded you flamebait but , I guess you mean installing boot camp or a virtual machine ( hypervisor ) and running it just like OS X , without antivirus/firewall and giving it access to OS X file structure.IMHO Apple made a huge mistake by allowing ( SL Bootcamp ) Windows to see ( read only though ) OS X drives .
That is not a favour , it is a huge security risk especially for Mac only people not knowing the extent of Windows threats/trojans/data leakage.Fix ?
" My Computer " , " Manage " , " Disk Management " , remove drive letter of the OS X drives .
At least 99.9999 malware which is n't very modern will fail to find the personal files to steal.To the " my virtual machine resets itself each boot " guys : If some real mean thing hits you , have fun explaining why your IP/computer was involved in some child porn distribution network " until it rebooted " .
Run some antivirus , it is NOT Mac once it runs Windows .</tokentext>
<sentencetext>Some fan guy modded you flamebait but, I guess you mean installing boot camp or a virtual machine (hypervisor) and running it just like OS X, without antivirus/firewall and giving it access to OS X file structure.IMHO Apple made a huge mistake by allowing (SL Bootcamp) Windows to see (read only though) OS X drives.
That is not a favour, it is a huge security risk especially for Mac only people not knowing the extent of Windows threats/trojans/data leakage.Fix?
"My Computer", "Manage", "Disk Management", remove drive letter of the OS X drives.
At least 99.9999 malware which isn't very modern will fail to find the personal files to steal.To the "my virtual machine resets itself each boot" guys: If some real mean thing hits you, have fun explaining why your IP/computer was involved in some child porn distribution network "until it rebooted".
Run some antivirus, it is NOT Mac once it runs Windows.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901342</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30902268</id>
	<title>Mac keyboard firmware security issue (keylogger</title>
	<author>blankoboy</author>
	<datestamp>1264509240000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I recall reading this (URL:http://www.semiaccurate.com/2009/07/31/apple-keyboard-firmware-hack-demonstrated/) last year but never heard any follow up from Apple. Does anyone know if there was actually any firmware release for this to close this potential security hole? It appears the likelihood of this getting exploited is rather small (requiring local access at this time) but it still warrants a response from Apple IMO.</htmltext>
<tokenext>I recall reading this ( URL : http : //www.semiaccurate.com/2009/07/31/apple-keyboard-firmware-hack-demonstrated/ ) last year but never heard any follow up from Apple .
Does anyone know if there was actually any firmware release for this to close this potential security hole ?
It appears the likelihood of this getting exploited is rather small ( requiring local access at this time ) but it still warrants a response from Apple IMO .</tokentext>
<sentencetext>I recall reading this (URL:http://www.semiaccurate.com/2009/07/31/apple-keyboard-firmware-hack-demonstrated/) last year but never heard any follow up from Apple.
Does anyone know if there was actually any firmware release for this to close this potential security hole?
It appears the likelihood of this getting exploited is rather small (requiring local access at this time) but it still warrants a response from Apple IMO.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30906786</id>
	<title>Not so fast</title>
	<author>Swift2001</author>
	<datestamp>1264530480000</datestamp>
	<modclass>Redundant</modclass>
	<modscore>0</modscore>
	<htmltext><p>I ran a Windows computer at work. And I had one at home. Never had a problem.</p><p>Then I went to another office. We had to spend a fair amount of time researching on the Web. All it took was one person landing on an illicit web site, and the shit hit the fan. All of a sudden, one after another, everybody's hit with trojans and God knows what else. No IT guy to run the thing, so I became the informal computer guy. Several computers are taken out and got the OS rebuilt. The only way to protect against the exploit that hit us is to update the OS. I do so, everything's fine with my machine. One computer after another gets hit with "You may be the victim of pirated software." Uh-oh. Turns out the boss bought the licenses for the software we used with Windows 2000. So then he upgraded to XP, but before the Microsoft Malicious Software (?) removal tool, nobody knew. Now it's picking up the proprietary program, reading the license, and going uh-uh. Can't upgrade. The new licenses would be about $8,000 per computer per year. (From the third-party software vendor. They only sell their program with the support, which costs that much. And they urge you to upgrade to the new version, which is another $13 grand.)</p><p>But we're going into recession. Not going to happen. So we have to go back to IE6 and Windows 2000 on some computers. They get hit again with web-based malware. It infects other software on the network. Could a good IT guy have fixed this? Yeah. We had 8 employees, and suddenly the phone wasn't ringing with the big contracts.</p><p>In the meantime, the Mac we had on the network for graphics and video conversions -- running like a top. Sure, I know. There are warning signs that show up on Security experts' blogs. Never, since I got a Mac in 1986, had an actual piece of malware. I realize I was a bit lucky in the early days, but I didn't exchange floppies with idiots, so I didn't get those old viruses.</p></htmltext>
<tokenext>I ran a Windows computer at work .
And I had one at home .
Never had a problem.Then I went to another office .
We had to spend a fair amount of time researching on the Web .
All it took was one person landing on an illicit web site , and the shit hit the fan .
All of a sudden , one after another , everybody 's hit with trojans and God knows what else .
No IT guy to run the thing , so I became the informal computer guy .
Several computers are taken out and got the OS rebuilt .
The only way to protect against the exploit that hit us is to update the OS .
I do so , everything 's fine with my machine .
One computer after another gets hit with " You may be the victim of pirated software .
" Uh-oh .
Turns out the boss bought the licenses for the software we used with Windows 2000 .
So then he upgraded to XP , but before the Microsoft Malicious Software ( ?
) removal tool , nobody knew .
Now it 's picking up the proprietary program , reading the license , and going uh-uh .
Ca n't upgrade .
The new licenses would be about $ 8,000 per computer per year .
( From the third-party software vendor .
They only sell their program with the support , which costs that much .
And they urge you to upgrade to the new version , which is another $ 13 grand .
) But we 're going into recession .
Not going to happen .
So we have to go back to IE6 and Windows 2000 on some computers .
They get hit again with web-based malware .
It infects other software on the network .
Could a good IT guy have fixed this ?
Yeah. We had 8 employees , and suddenly the phone was n't ringing with the big contracts.In the meantime , the Mac we had on the network for graphics and video conversions -- running like a top .
Sure , I know .
There are warning signs that show up on Security experts ' blogs .
Never , since I got a Mac in 1986 , had an actual piece of malware .
I realize I was a bit lucky in the early days , but I did n't exchange floppies with idiots , so I did n't get those old viruses .</tokentext>
<sentencetext>I ran a Windows computer at work.
And I had one at home.
Never had a problem.Then I went to another office.
We had to spend a fair amount of time researching on the Web.
All it took was one person landing on an illicit web site, and the shit hit the fan.
All of a sudden, one after another, everybody's hit with trojans and God knows what else.
No IT guy to run the thing, so I became the informal computer guy.
Several computers are taken out and got the OS rebuilt.
The only way to protect against the exploit that hit us is to update the OS.
I do so, everything's fine with my machine.
One computer after another gets hit with "You may be the victim of pirated software.
" Uh-oh.
Turns out the boss bought the licenses for the software we used with Windows 2000.
So then he upgraded to XP, but before the Microsoft Malicious Software (?
) removal tool, nobody knew.
Now it's picking up the proprietary program, reading the license, and going uh-uh.
Can't upgrade.
The new licenses would be about $8,000 per computer per year.
(From the third-party software vendor.
They only sell their program with the support, which costs that much.
And they urge you to upgrade to the new version, which is another $13 grand.
)But we're going into recession.
Not going to happen.
So we have to go back to IE6 and Windows 2000 on some computers.
They get hit again with web-based malware.
It infects other software on the network.
Could a good IT guy have fixed this?
Yeah. We had 8 employees, and suddenly the phone wasn't ringing with the big contracts.In the meantime, the Mac we had on the network for graphics and video conversions -- running like a top.
Sure, I know.
There are warning signs that show up on Security experts' blogs.
Never, since I got a Mac in 1986, had an actual piece of malware.
I realize I was a bit lucky in the early days, but I didn't exchange floppies with idiots, so I didn't get those old viruses.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901588</id>
	<title>Re:bad karma</title>
	<author>Anonymous</author>
	<datestamp>1264499820000</datestamp>
	<modclass>Offtopic</modclass>
	<modscore>-1</modscore>
	<htmltext><p>That sucks, but don't give up yet.  Keep at it, you'll get your karma back eventually<nobr> <wbr></nobr>:-)</p></htmltext>
<tokenext>That sucks , but do n't give up yet .
Keep at it , you 'll get your karma back eventually : - )</tokentext>
<sentencetext>That sucks, but don't give up yet.
Keep at it, you'll get your karma back eventually :-)</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901382</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901614</id>
	<title>Macs are not secure.</title>
	<author>Anonymous</author>
	<datestamp>1264500240000</datestamp>
	<modclass>Flamebait</modclass>
	<modscore>-1</modscore>
	<htmltext><p>Macs feel secure, but only because of Apple's market share.  It's a fact.</p><p>http://www.youtube.com/watch?v=Hn5K3V62CFQ</p><p>By the way, if Apple makes claims that Macs don't get viruses in their commercials, why does an anti-virus solutions exist that Apple actually recommends installing as read on their website?</p></htmltext>
<tokenext>Macs feel secure , but only because of Apple 's market share .
It 's a fact.http : //www.youtube.com/watch ? v = Hn5K3V62CFQBy the way , if Apple makes claims that Macs do n't get viruses in their commercials , why does an anti-virus solutions exist that Apple actually recommends installing as read on their website ?</tokentext>
<sentencetext>Macs feel secure, but only because of Apple's market share.
It's a fact.http://www.youtube.com/watch?v=Hn5K3V62CFQBy the way, if Apple makes claims that Macs don't get viruses in their commercials, why does an anti-virus solutions exist that Apple actually recommends installing as read on their website?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30903166</id>
	<title>Re:With great freedom comes great resposibility</title>
	<author>mdwh2</author>
	<datestamp>1264516500000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>4</modscore>
	<htmltext><p>When people point out something the Iphone can't do, we hear "Oh it can, but you just have to jailbreak it". When we get stories about security holes, we hear "Oh that doesn't count, you just have to not jailbreak it".</p><p>So er, which is it?</p><p>The problem is that the Iphone is the only phone where "jailbreaking" is necessary to get basic functionality working (e.g., tethering, running applications that Apple don't like).</p><p>Consider, do you ever hear people talking about "jailbreaking" in the context of any other phone?</p><p>My 5800 works fine, not had a virus (indeed on any of my phones), never needed to hack it.</p></htmltext>
<tokenext>When people point out something the Iphone ca n't do , we hear " Oh it can , but you just have to jailbreak it " .
When we get stories about security holes , we hear " Oh that does n't count , you just have to not jailbreak it " .So er , which is it ? The problem is that the Iphone is the only phone where " jailbreaking " is necessary to get basic functionality working ( e.g. , tethering , running applications that Apple do n't like ) .Consider , do you ever hear people talking about " jailbreaking " in the context of any other phone ? My 5800 works fine , not had a virus ( indeed on any of my phones ) , never needed to hack it .</tokentext>
<sentencetext>When people point out something the Iphone can't do, we hear "Oh it can, but you just have to jailbreak it".
When we get stories about security holes, we hear "Oh that doesn't count, you just have to not jailbreak it".So er, which is it?The problem is that the Iphone is the only phone where "jailbreaking" is necessary to get basic functionality working (e.g., tethering, running applications that Apple don't like).Consider, do you ever hear people talking about "jailbreaking" in the context of any other phone?My 5800 works fine, not had a virus (indeed on any of my phones), never needed to hack it.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901268</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30904848</id>
	<title>Re:Apple's DRM seems to be the main problem</title>
	<author>intheshelter</author>
	<datestamp>1264523160000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Draconian?  Really?  I own many Apple products and I am rarely stopped from doing anything.  Perhaps your hatred of Apple has colored your post to the point that it's ridiculous hyperbole?</htmltext>
<tokenext>Draconian ?
Really ? I own many Apple products and I am rarely stopped from doing anything .
Perhaps your hatred of Apple has colored your post to the point that it 's ridiculous hyperbole ?</tokentext>
<sentencetext>Draconian?
Really?  I own many Apple products and I am rarely stopped from doing anything.
Perhaps your hatred of Apple has colored your post to the point that it's ridiculous hyperbole?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901922</parent>
</comment>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_25_2153201_23</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30907434
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901342
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_25_2153201_21</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901588
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901382
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_25_2153201_20</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30909660
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30903166
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901268
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_25_2153201_1</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901640
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901516
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901268
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_25_2153201_25</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901324
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901222
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_25_2153201_24</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901484
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901382
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_25_2153201_12</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30907652
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901828
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_25_2153201_5</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30905684
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901874
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_25_2153201_3</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30902622
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901922
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_25_2153201_22</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30909628
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30903166
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901268
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_25_2153201_2</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901666
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901268
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_25_2153201_16</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30907534
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901478
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_25_2153201_9</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30907012
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901544
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901222
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_25_2153201_13</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30913516
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30905750
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30903166
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901268
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_25_2153201_10</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30908058
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901922
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_25_2153201_17</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30904460
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901828
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_25_2153201_6</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30909326
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30903166
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901268
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_25_2153201_0</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30903182
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901382
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_25_2153201_14</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901660
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901222
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_25_2153201_18</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30902458
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901922
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_25_2153201_7</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901422
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901222
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_25_2153201_11</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30904848
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901922
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_25_2153201_4</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30903338
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901222
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_25_2153201_15</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901476
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901342
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_25_2153201_19</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901878
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901268
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_10_01_25_2153201_8</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901814
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901486
</commentlist>
</thread>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_01_25_2153201.9</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901520
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_01_25_2153201.3</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901614
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_01_25_2153201.1</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901828
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30904460
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30907652
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_01_25_2153201.4</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901342
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901476
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30907434
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_01_25_2153201.7</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901430
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_01_25_2153201.5</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901874
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30905684
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_01_25_2153201.8</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901486
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901814
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_01_25_2153201.12</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901922
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30904848
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30902622
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30902458
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30908058
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_01_25_2153201.2</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901268
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901878
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30903166
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30905750
---http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30913516
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30909628
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30909326
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30909660
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901516
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901640
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901666
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_01_25_2153201.6</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901224
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_01_25_2153201.0</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901478
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30907534
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_01_25_2153201.13</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901222
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901324
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901544
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30907012
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901660
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30903338
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901422
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_01_25_2153201.10</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30902268
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation10_01_25_2153201.11</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901382
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901484
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30903182
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment10_01_25_2153201.30901588
</commentlist>
</conversation>
