Posts tagged used

Apple Sent Porn To A Developer To Prove His App Could Be Used To Find Porn

Pornographic content is forbidden in the Apple App Store, but Apple seems to be OK with sending porn to developers who submit their apps for review, according to one who received an inappropriate pic. 

“It turns out Apple thought the best way to tell us our app could be used to surf porn was to surf for porn using our app,” Carl Smith, a Florida developer for nGen Works, wrote in a blog post on Medium (NSFW link). 

The email, which Smith shared with ReadWrite, appears to be from the Apple app review team and includes an attached photo of a man’s genitalia, but no warning of the enclosed content. This is the kind of thing that can create a hostile work environment for nGen employees whose jobs necessitate reading emails from Apple. 

See also: The Majority Of Porn In The United States Is Viewed On Smartphones

Smith suggested a number of alternatives he thought Apple could have used to indicate a concern about explicit content. The team could have sent nGen Works a search term to try, or even warn in advance what the emailed photo was of. Instead, Smith said the developers who opened the email had no warning that it would be graphic.

“What I want from Apple is for them to address the issue and put a policy in place that prevents an App store reviewer from sending pornographic images as an example of a issue,” he said. “They could have easily masked out the bad part of the photo or told us a phrase to search. At the very least warn someone before they open the attachments that they aren’t safe for work.”

“Specifically, we noticed your app contains objectionable content at time of review. Please see the attached screenshot/s for more information,” the Apple review team email reads, before offering a downloadable file that turned out to be the genitalia photo in question.

Smith said solution is hypocritical of the company. Of course nGen’s app, which allows users to enlarge, save, and search for Instagram photos, would be capable of browsing any photo that exists on Instagram already.

“This is a double standard,” Smith told ReadWrite. “If I type bad words into Safari I am going to see bad things. So I think Apple needs to address that.”

Smith said he doubted Apple’s “upper echelons” would approve of this action, and encouraged readers to spread the word.

We’ve contacted Apple for a comment on this allegation.

Photo via Shutterstock

View full post on ReadWrite

Apple Now Lets You Check If That Used iPhone Is Stolen

Buying a used iPhone on eBay or Craigslist has become a little less scary now, thanks to a new Apple tool that can help budget shoppers spot stolen devices before they buy.

The iCloud webpage, “Check Activation Lock Status,” does exactly what it says: It checks whether the registered owner has turned on Activation Lock, a Find My iPhone security tool introduced in iOS 7 that requires the registered owner’s Apple ID before it can erase or reactivate an Apple device. Presumably, iPhone owners would shut off this feature before selling to another party.

Stolen Apple gadgets, however, are more likely to have Activation Lock still on. And now, it’s easy to check on that status. 

The Check Activation Lock Status is extremely simple to use: Just go to the page and type in the unique IMEI or serial number used to identify the device. Although it’s available in Settings > General > About on the device, or in iTunes when the iPhone is connected, a shopper may not be able access those areas.

Fortunately, Apple includes that information on the box, which is helpful if you’re transacting in person. If not, at least ask the seller for one or both of the numbers, and perhaps some photographic proof that they’re legitimate. 

Apple’s Activation Lock Status checker

See also: A Thief Snatched My iPhone—And I Learned A Lot About Smartphone Crime

Buyers Beware, And Be Savvy

All iPhones for sale—new or used—should sell with Activation Lock turned off. If it’s on, a new owner would not be able to set up the phone with a new Apple ID.

But, thanks to some hacks that have surfaced, it’s not always that easy to tell the difference.

In May, Apple blog iClarified reported the news of some rough third-party workarounds. One, called doulCi, claimed that it’s intended for legitimate purposes (say, if you forgot your login, or changed your password and can’t remember the new one). The hack involved adding a line to the “hosts” file, a fairly simple procedure that would let you (or anyone else) bypass the activation lock screen. 

It’s not a perfect hack, though. Some folks discovered that it hobbled cellular service. Still, it should have been good enough to fool unwitting buyers. If not, apparently renowned iPhone hacker “iH8sn0w” apparently also found another Activation Lock loophole. 

See also: How To Get Smart About Smartphone Theft

For now, doulCi’s iOS 7 support works for all iPhones prior to the new 6 models, going all the way back to the 3GS, as well as all iPads. The team also has iOS 8 support in the works. 

This is likely what prompted Apple to push the “Check Activation Lock Status” tool out to the public. With this, even if the lock’s busted on the iPhone itself, Apple’s server can still step in and rat out the crook. 

Police photo by Scott Davidson. Screenshots by Adriana Lee for ReadWrite. 

View full post on ReadWrite

SEO 101: Why Headings Should Be Used by @michielheijmans

This post just had to be written. Somehow we have a chapter about Headings in all (!) our site reviews. Usually the website owner can’t change a single thing about the heading setup of the website, as he is unwilling or just lacks the knowledge to change the theme of the website. But headings do matter. There are two ways headings can structure your content. In classic HTML, there would be 1 H1 tag on each page, maybe a couple of H2′s etc and these would all combine to form an outline of the entire document. In HTML5, each sectioning tag (for instance  and ) […]

The post SEO 101: Why Headings Should Be Used by @michielheijmans appeared first on Search Engine Journal.

View full post on Search Engine Journal

Serious security hole found in SEO plugin used by millions of WordPress users … – Graham Cluley Security News

Serious security hole found in SEO plugin used by millions of WordPress users
Graham Cluley Security News
If so, you need to update the plugin as soon as possible to the latest version. The All in One SEO Pack plugin is a very popular choice for webmasters who wish to boost their WordPress-powered site's position in search engine rankings. Indeed, over 18 …

View full post on SEO – Google News

5 Tactics We Used To Build Links Last Month

There are a lot of questions around link building tactics these days, especially when it comes to how companies can actually build links that won’t get them in trouble. In fact, one of the most common questions I hear at conferences and from clients is, “How do you build good…



Please visit Search Engine Land for the full article.

View full post on Search Engine Land: News & Info About SEO, PPC, SEM, Search Engines & Search Marketing

How One Company Used Promoted Tweets to Heat Up Sales During the Polar Vortex

Chegg, a company focused on connecting college students to resources, has a seasonal business. Here’s how the brand used Twitter’s promoted tweets advertising, the “polar vortex” and free shipping for a slam-dunk back-to-school marketing campaign.

View full post on Search Engine Watch – Latest

Reports: NSA Used Google Cookies for Data Spying

Just a few days after they ganged up on the government to ask them to curb the NSA’s spying enthusiasm, tech giants are faced with another rather inconvenient truth: that the NSA is actually piggy-backing on Google cookies to gather intelligence.

View full post on Search Engine Watch – Latest

Go to Top
Copyright © 1992-2014, DC2NET All rights reserved