As of early , subsequent releases required an Intel Mac, much to the annoyance of a lot of older Mac users. This created quite a stir in the Mac world, as it enabled — amongst other things — embedded Flash videos in sites such as Facebook to load — a feature requiring Flash Since then it has been fairly quiet on the subject, but I was recently pointed to another hack that brings it right up to date — offering a special version of the Flash plugin taking up to I have zipped it.
Older versions of Flash may be vulnerable to attacks that have been patched in newer versions. Be aware of this. While this has enabled Flash 16 videos, it is essentially Flash Low End Mac takes no responsibility for any hardware, software, or financial issues that might arise from using this hacked plugin. I would be very interested to hear from anyone who tries it. If you are using TenFourFox , you should already be aware that version 17 was the last to support plugins and the current version is If you wish to use this Flash hack, you should use a different version or stick with the older version.
I did not create this hack, nor so I own the DMG file.
Essential web browser plugin for PPC Macs
If you own it and would like it taken down or credit given please contact me. Low End Mac is funded primarily through donations. I used my 1.
Between the low amount of exploits that run on PPC and as long as the machine is behind a firewall hardware preferably but software is fine or both if your really concerned the risk being compromised is pretty close to nill. I'm not suggesting sticking ether of them on a direct connection to the net just saying if you have a proper network installation preventing access from the outside and don't do dumb stuff like install random binaries offered up via popup you are as safe as your going to get.
Like my Network design professor said "if you want a completely secure system unplug it and smash the HDD with a hammer. To expand on what IPalindromeI said, there are a Security is a complicated issue, so get your tea or coffee and settle in. Hopefully this reads as informative and helpful and not as a "rant. Firstly, you're correct, no amount of security is actually total security. That having been said, your network design professor would have been remiss if they ended the statement there and didn't talk about what levels of risk are acceptable, etc.
You live in the United States, and you haven't specifically mentioned a predilection for your telco, so I'm just going to presume that you have cable Internet, generously, let's call it 30 by 5 megabits. Even though I'd argue that that should be blocked along with incoming 25, for residential connections that don't order a static and specifically opt to open And, today it's not about getting your data or just causing damage for the sake of damage.
This thread which was started in August essentially prophesied shellshock just about a month ago. The biggest reason a few of us make sure to drop at least a subtle reminder to think about security in most threads like this discussing the use of PowerPC computers as daily workstations is because most people who are looking at Macs just aren't thinking about finding non-Apple patches to an "internal" part of the operating system that they're not likely to look at.
In fact, many Mac users most of them? I would say that we have a proportionally low amount of that population on this site, but that they are there. The question that has been brought up is whether or not it's worth it for there to be a page on the 68kMLA Wiki as an example of where it could be with a guide on how to harden older versions of Mac OS X after the fact.
Not just discussing the possibilities, but actually patching problems as they come out. Some people such as Cameron Kaiser, who ports Firefox as TenFourFox and who released the aforelinked shellshock patch are sort of involved with the process, but they only seem to get vocal when a really big security bug is found, and nobody seems to be interested in, say, updating CUPS, etc. The guide would have to both be a practical information guide on how Mac OS X is configured when it ships and how you can change the configuration, and it would need to have mirrored copies of Apple's updates available or at least links to Apple's combo updaters , and it would need to have information on security events after the release of that version of Mac OS X, and whoever maintains it johnklos might be a good candidate would also need to be somebody who keeps up with the CVEs because I only run operating systems that are getting updates from a community or vendor, I don't specifically follow CVEs and other security issues, and ideally somebody who can actually produce the patches for the page.
Also, let's be honest, this is a Mac site and not all Mac users actually have the self awareness to do things like not click on unknown links, not run unknown binaries, and not joining unknown wireless networks. Somewhat ironically, those people running Linux on their PowerPC Mac hardware are actually hit a lot harder by the shellshock bash vulnerabilities, due to things like the unknown DHCP servers and the fact that on linux, you can run any command you want, as root, through the DHCP client on the system. That goes to show more about the value of patching frequently than to be a specific indictment of Linux or a specific praise of Mac OS X for some of its different design decisions.
That can be another thread if somebody wants. The reason I call out patching linux is that some people like to go "Well, I'm running Ubuntu 8.
fixed : get newest version of Flash on PowerPC Mac
The participants in this thread may already know this information, but this is on a public part of the web site and our web site gets googled and used as a resource by a lot of people. Most of these things are turned off, but some enthusiasts turn things on, and a vulnerability like shellshock actually introduces the possibility to enable services remotely simply by way of routine requests the computer makes, or by tacking things on, say, to requests that mediawiki makes. Mac OS 9 is its own thing, and has essentially no underpinnings whatsoever.
That's OpenTransport's job.
Welcome Image and Text
In addition to that, Mac OS 9 doesn't really have a unified way to remotely issue commands to the system. There's remote AppleScript, which needs to be enabled, and which you can kill by tossing the extensions into the trash. Windows 9x integrated a few more things into the operating system itself than Mac OS 9x did, or at least made them slightly more difficult to extract, but most of the same stuff applies, with the exception that some of the server code Microsoft doesn't include in Windows, namely a mail transfer agent that I know of, but that's because Microsoft wants you to buy a copy of Exchange.
Oh, that and Windows 9x does have a shell, but it's not super commonly remotely accessible, at least based on what's built into the system. So, I hope that's helpful. Owning a modern Mac is, for better or worse, an exercise in keeping up with a technology treadmill. Fortunately, that treadmill is becoming easier to keep up with as Mac OS X hasn't increased system requirements since I flubbed the link to xkcd for heartbleed, meant to use this one: I can agree with that and makes since.
I do forget many people don't have the knowledge how their system actually work and for the most part don't want to know. All configured without DHCP. So definitely not your standard setup but it is what happens when you have a Network Administration Degree and can't find work. That was the middle of September, and here it is, not even three months later, and what version of Flash is Adobe offering?
You need to be a member in order to leave a comment. Sign up for a new account in our community. It's easy! Already have an account? Sign in here. Search In. Recommended Posts.
Flash Hack for PowerPC Updated to | Low End Mac
Report post. Posted September 16, Get it here: Share this post Link to post Share on other sites.
Hulu is the only site I can think of which uses Flash that I might ever want to visit. Posted September 16, edited.