Welcome to Smokey's Security Forums.
As a guest you only have limited access to the board and it's features, please consider registering to gain full access!
Registration is free and it only takes a few moments to complete.

Smokeys Pc Help & Security Forums

Please login or register.

Login with username, password and session length
Advanced search  

News:

New Intel Security Vulnerability Discovered, Millions of Laptops Affected

As if the Meltdown and Spectre bugs weren’t enough trouble for Intel already, security researcher Harry Sintonen working for Finnish company F-Secure discovered another vulnerability that potentially affects millions of corporate laptops.

New Intel Security Vulnerability Discovered, Millions of Laptops Affected

Malware Log Analysis & Removal Help * Ransomware Encryption & Decrytion Techniques * Official Jetico Inc. Support Forums

Share this topic on FacebookShare this topic on MySpaceShare this topic on RedditShare this topic on TwitterAuthorTopic: The future of the Finder  (Read 52 times)

0 Members and 1 Guest are viewing this topic.

ScarlettTopic starter

  • Updates Moderator
  • *
  • Offline Offline
  • location: Cymru
  • Posts: 22704
The future of the Finder
« Reply #1 on: July 21, 2017, 02:15:33 PM »
The future of the Finder
21 July 2017, 1:00 pm



This is the last installment of this column, and as such, I wanted to cover one of the most important features on the Mac: the Finder. This file manager, browser, and user interface layer is the tool that people use to launch applications, work with and manage files and folders, and control pretty much everything their computer does.

The early Mac was revolutionary, bringing the desktop metaphor to everyday computers. It wasn’t the first computer to use this type of interface, but it was the first one that was widely adopted. Instead of controlling a computer by typing lines of text commands, it used the WIMP interface: windows, icons, menus, and pointer. (And even before text commands, computers were controlled by punch cards, tapes, and other ways of inputting commands and data.)

To read this article in full or to leave a comment, please click here



Source: Macworld OS X

This article is offered by  IDG Consumer & SMB. Copyright 1998 - 2017.

>>> To obtain the full Macworld article, click the link in the first post line <<<
 

* Permissions
You can't post new topics.
You can't post replies.
You can't post attachments.
You can't modify your posts.
BBCode Enabled
Smilies Enabled
[img] Enabled
HTML Disabled


Except where otherwise stated, all content, graphics, banners and images included © 2006 - 2018 Smokey Services™ -- All rights reserved

Design board graphics by PseFrank & DSTM

This site does not store profiling-, tracking-, third-party and/or any other non-essential cookie(s) on client computers and is fully compliant with the EU ePrivacy Directive
Smokey's does not use any Web Analytics/Analysis Service, and also does not use any browser fingerprinting techniques

    

  

Smokey's also provides free fully qualified FRST (Farbar Recovery Scan Tool) Log / Malware Analysis & Removal Help and System Health Checks
rifle
rifle
rifle
rifle