|
|
|
![]() |
|
Strumenti |
![]() |
#1 |
www.hwupgrade.it
Iscritto dal: Jul 2001
Messaggi: 75173
|
Link alla notizia: http://www.hwupgrade.it/news/sicurez...s-x_32099.html
Con l'aggiornamento 10.6.3 Apple apporta 49 miglioramenti e corregge oltre 70 vulnerabilità individuate in Mac OS X Snow Leopard Click sul link per visualizzare la notizia. |
![]() |
![]() |
![]() |
#2 |
Senior Member
Iscritto dal: Jan 2003
Messaggi: 1270
|
Installato ieri sera.
Tutto liscio. |
![]() |
![]() |
![]() |
#3 |
Member
Iscritto dal: Nov 2009
Messaggi: 34
|
il mio Eeebox non lo ha goduto tanto... ;-P
|
![]() |
![]() |
![]() |
#4 |
Senior Member
Iscritto dal: Jan 2007
Messaggi: 1137
|
io ho un mbp 13" con snow leopard, tutto aggiornato, e la 10.6.3 era da ~749mb...e non avevo altri sw professionali e non della apple installati( leggevo che erano inclusi anke aggiornamenti per logic pro ecc)
Ultima modifica di Gurzo2007 : 30-03-2010 alle 13:33. |
![]() |
![]() |
![]() |
#5 |
Senior Member
Iscritto dal: Feb 2005
Città: Grosseto
Messaggi: 474
|
lo scarico stasera sul mio macbook alluminio (rigoroso dual boot con win 7 64 bit)
|
![]() |
![]() |
![]() |
#6 |
Senior Member
Iscritto dal: Oct 2003
Città: TV
Messaggi: 10816
|
apple DEVE rilascarmi i nuovi MBP!! altro che 10.6.3.....
![]()
__________________
cagnaluia MTB|DH|Running|Diving Eos1DX|16-35f4Lis|35f1.4L|100f2|300F4LIS |
![]() |
![]() |
![]() |
#7 |
Member
Iscritto dal: May 2006
Messaggi: 61
|
Era uno dei passi da molti ritenuto necessario per il rilascio dei nuovi MBP.
Speriamo ![]() |
![]() |
![]() |
![]() |
#8 |
Senior Member
Iscritto dal: Apr 2006
Messaggi: 527
|
porcamiseria mi ha reallentato come pochi il mio nuovo MBP
![]() senza contare ceh non avevo installato praticamente nulla ![]() sconsiglio a tutti di installarlo potrebbe essere un bug ![]() |
![]() |
![]() |
![]() |
#9 |
Senior Member
Iscritto dal: Jan 2004
Città: Vicenza Prov.
Messaggi: 630
|
macbook nuovi al 100% martedì prossimo
__________________
iMac MOD - P A O L O T E N N I S M A C - |
![]() |
![]() |
![]() |
#10 |
Senior Member
Iscritto dal: May 2000
Città: Ferrara
Messaggi: 249
|
installato la notte scorsa su un MBP alluminio, un MB bianco e un IMAC bianco coreduo... Tutti e tre non hanno avuto problemi durante l'installazione.
Riavviato, fatto la solita riparazione dei permessi. Per ora ottima impressione, più reattivi a trovare la rete wifi uscendo dallo stop. |
![]() |
![]() |
![]() |
#11 |
Senior Member
Iscritto dal: Oct 2006
Messaggi: 3166
|
|
![]() |
![]() |
![]() |
#12 |
Senior Member
Iscritto dal: Dec 2004
Città: Milano
Messaggi: 4631
|
L'unica manutenzione che da tempo immemore si pratica sui Mac dopo installazioni/aggiornamenti software....
Cartella Utility/Utility Disco/Verifica e Ripara Permessi.... OSX è un sistema Unix, non scordarlo... ![]()
__________________
MacBook Pro Early 2011, MacOs High Sierra- Apple Time Capsule 2Tb - iPhone 6s Plus Space Grey 128G |
![]() |
![]() |
![]() |
#13 |
Member
Iscritto dal: Aug 2004
Messaggi: 83
|
...
Per altre risposte guarda questo link:
http://www.tuttologia.com/tutorial/mac-ripara-permessi.html |
![]() |
![]() |
![]() |
#14 | |
Senior Member
Iscritto dal: Jan 2007
Messaggi: 1137
|
Quote:
ps avere una base buona non vuol dire avere un buon so ![]() pps recentemente ho usato cleanmymac....ho tolto più di 3gb di robaccia sul mio mbp...meno male che la robbaccia c'era solo su win Ultima modifica di Gurzo2007 : 30-03-2010 alle 16:22. |
|
![]() |
![]() |
![]() |
#15 |
Bannato
Iscritto dal: Oct 2009
Messaggi: 180
|
http://attivissimo.blogspot.com/2010...di-update.html
Ps: per quanto riguarda XNU... alla fine è stato certificato Unix. E' un Unix. Ed è meglio così. |
![]() |
![]() |
![]() |
#16 | |
Bannato
Iscritto dal: Mar 2010
Messaggi: 15
|
E' Unix...
Quote:
![]() Vulnerabilita' patchate con aggiornamento ad Osx 10.6.3 Solo 720MB di Patch. http://support.apple.com/kb/HT4077 AppKit CVE-ID: CVE-2010-0056 Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8 Impact: Spell checking a maliciously crafted document may lead to an unexpected application termination or arbitrary code execution Application Firewall CVE-ID: CVE-2009-2801 Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8 Impact: Certain rules in the Application Firewall may become inactive after restart AFP Server CVE-ID: CVE-2010-0057 Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.2, Mac OS X Server v10.6 through v10.6.2 Impact: When guest access is disabled, a remote user may be able to mount AFP shares as a guest AFP Server CVE-ID: CVE-2010-0533 Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.2, Mac OS X Server v10.6 through v10.6.2 Impact: A remote user with guest access to an AFP share may access the contents of world-readable files outside the Public share Apache CVE-ID: CVE-2009-3095 Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.2, Mac OS X Server v10.6 through v10.6.2 Impact: A remote attacker may be able to bypass access control restrictions ClamAV CVE-ID: CVE-2010-0058 Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8 Impact: ClamAV virus definitions may not receive updates CoreAudio CVE-ID: CVE-2010-0059 Available for: Mac OS X v10.6 through v10.6.2, Mac OS X Server v10.6 through v10.6.2 Impact: Playing maliciously crafted audio content may lead to an unexpected application termination or arbitrary code execution CoreAudio CVE-ID: CVE-2010-0060 Available for: Mac OS X v10.6 through v10.6.2, Mac OS X Server v10.6 through v10.6.2 Impact: Playing maliciously crafted audio content may lead to an unexpected application termination or arbitrary code execution CoreMedia CVE-ID: CVE-2010-0062 Available for: Mac OS X v10.6 through v10.6.2, Mac OS X Server v10.6 through v10.6.2 Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution CoreTypes CVE-ID: CVE-2010-0063 Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.2, Mac OS X Server v10.6 through v10.6.2 Impact: Users are not warned before opening certain potentially unsafe content types CUPS CVE-ID: CVE-2010-0393 Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.2, Mac OS X Server v10.6 through v10.6.2 Impact: A local user may be able to obtain system privileges curl CVE-ID: CVE-2009-2417 Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.2, Mac OS X Server v10.6 through v10.6.2 Impact: A man-in-the-middle attacker may be able to impersonate a trusted server curl CVE-ID: CVE-2009-0037 Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8 Impact: Using curl with -L may allow a remote attacker to read or write local files Cyrus IMAP CVE-ID: CVE-2009-2632 Available for: Mac OS X Server v10.5.8 Impact: A local user may be able to obtain the privileges of the Cyrus user Cyrus SASL CVE-ID: CVE-2009-0688 Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8 Impact: An unauthenticated remote attacker may cause unexpected application termination or arbitrary code execution DesktopServices CVE-ID: CVE-2010-0064 Available for: Mac OS X v10.6 through v10.6.2, Mac OS X Server v10.6 through v10.6.2 Impact: Items copied in the Finder may be assigned an unexpected file owner DesktopServices CVE-ID: CVE-2010-0537 Available for: Mac OS X v10.6 through v10.6.2, Mac OS X Server v10.6 through v10.6.2 Impact: A remote attacker may gain access to user data via a multi-stage attack Disk Images CVE-ID: CVE-2010-0065 Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.2, Mac OS X Server v10.6 through v10.6.2 Impact: Mounting a maliciously crafted disk image may lead to an unexpected application termination or arbitrary code execution Disk Images CVE-ID: CVE-2010-0497 Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.2, Mac OS X Server v10.6 through v10.6.2 Impact: Mounting a maliciously crafted disk image may lead to arbitrary code execution Directory Services CVE-ID: CVE-2010-0498 Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.2, Mac OS X Server v10.6 through v10.6.2 Impact: A local user may obtain system privileges Dovecot CVE-ID: CVE-2010-0535 Available for: Mac OS X v10.6 through v10.6.2, Mac OS X Server v10.6 through v10.6.2 Impact: An authenticated user may be able to send and receive mail even if the user is not on the SACL of users who are permitted to do so Event Monitor CVE-ID: CVE-2010-0500 Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.2, Mac OS X Server v10.6 through v10.6.2 Impact: A remote attacker may cause arbitrary systems to be added to the firewall blacklist FreeRADIUS CVE-ID: CVE-2010-0524 Available for: Mac OS X Server v10.5.8, Mac OS X Server v10.6 through v10.6.2 Impact: A remote attacker may obtain access to a network via RADIUS authentication FTP Server CVE-ID: CVE-2010-0501 Available for: Mac OS X Server v10.5.8, Mac OS X Server v10.6 through v10.6.2 Impact: Users may be able to retrieve files outside the FTP root directory iChat Server CVE-ID: CVE-2006-1329 Available for: Mac OS X Server v10.5.8, Mac OS X Server v10.6 through v10.6.2 Impact: A remote attacker may be able to cause a denial of service iChat Server CVE-ID: CVE-2010-0502 Available for: Mac OS X Server v10.5.8, Mac OS X Server v10.6 through v10.6.2 Impact: Chat messages may not be logged iChat Server CVE-ID: CVE-2010-0503 Available for: Mac OS X Server v10.5.8 Impact: An authenticated user may be able to cause an unexpected application termination or arbitrary code execution iChat Server CVE-ID: CVE-2010-0504 Available for: Mac OS X Server v10.5.8, Mac OS X Server v10.6 through v10.6.2 Impact: An authenticated user may be able to cause an unexpected application termination or arbitrary code execution ImageIO CVE-ID: CVE-2010-0505 Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.2, Mac OS X Server v10.6 through v10.6.2 Impact: Viewing a maliciously crafted JP2 image may lead to an unexpected application termination or arbitrary code execution ImageIO CVE-ID: CVE-2010-0041 Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.2, Mac OS X Server v10.6 through v10.6.2 Impact: Visiting a maliciously crafted website may result in sending data from Safari's memory to the website ImageIO CVE-ID: CVE-2010-0042 Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.2, Mac OS X Server v10.6 through v10.6.2 Impact: Visiting a maliciously crafted website may result in sending data from Safari's memory to the website ImageIO CVE-ID: CVE-2010-0043 Available for: Mac OS X v10.6 through v10.6.2, Mac OS X Server v10.6 through v10.6.2 Impact: Processing a maliciously crafted TIFF image may lead to an unexpected application termination or arbitrary code execution Image RAW CVE-ID: CVE-2010-0506 Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8 Impact: Viewing a maliciously crafted NEF image may lead to an unexpected application termination or arbitrary code execution Image RAW CVE-ID: CVE-2010-0507 Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.2, Mac OS X Server v10.6 through v10.6.2 Impact: Viewing a maliciously crafted PEF image may lead to an unexpected application termination or arbitrary code execution Libsystem CVE-ID: CVE-2009-0689 Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.2, Mac OS X Server v10.6 through v10.6.2 Impact: Applications that convert untrusted data between binary floating point and text may be vulnerable to an unexpected application termination or arbitrary code execution CVE-ID: CVE-2010-0508 Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.2, Mac OS X Server v10.6 through v10.6.2 Impact: Rules associated with a deleted mail account remain in effect CVE-ID: CVE-2010-0525 Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.2, Mac OS X Server v10.6 through v10.6.2 Impact: Mail may use a weaker encryption key for outgoing email Mailman CVE-ID: CVE-2008-0564 Available for: Mac OS X Server v10.5.8 Impact: Multiple vulnerabilities in Mailman 2.1.9 MySQL CVE-ID: CVE-2008-4456, CVE-2008-7247, CVE-2009-2446, CVE-2009-4019, CVE-2009-4030 Available for: Mac OS X Server v10.6 through v10.6.2 Impact: Multiple vulnerabilities in MySQL 5.0.82 OS Services CVE-ID: CVE-2010-0509 Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.2, Mac OS X Server v10.6 through v10.6.2 Impact: A local user may be able to obtain elevated privileges Password Server CVE-ID: CVE-2010-0510 Available for: Mac OS X Server v10.5.8, Mac OS X Server v10.6 through v10.6.2 Impact: A remote attacker may be able to log in with an outdated password perl CVE-ID: CVE-2008-5302, CVE-2008-5303 Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8 Impact: A local user may cause arbitrary files to be deleted PHP CVE-ID: CVE-2009-3557, CVE-2009-3558, CVE-2009-3559, CVE-2009-4017 Available for: Mac OS X v10.6 through v10.6.2, Mac OS X Server v10.6 through v10.6.2 Impact: Multiple vulnerabilities in PHP 5.3.0 PHP CVE-ID: CVE-2009-3557, CVE-2009-3558, CVE-2009-3559, CVE-2009-4142, CVE-2009-4143 Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8 Impact: Multiple vulnerabilities in PHP 5.2.11 Podcast Producer CVE-ID: CVE-2010-0511 Available for: Mac OS X Server v10.6 through v10.6.2 Impact: An unauthorized user may be able to access a Podcast Composer workflow Preferences CVE-ID: CVE-2010-0512 Available for: Mac OS X v10.6 through v10.6.2, Mac OS X Server v10.6 through v10.6.2 Impact: A network user may be able to bypass system login restrictions PS Normalizer CVE-ID: CVE-2010-0513 Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.2, Mac OS X Server v10.6 through v10.6.2 Impact: Viewing a maliciously crafted PostScript file may lead to an unexpected application termination or arbitrary code execution QuickTime CVE-ID: CVE-2010-0062 Available for: Mac OS X v10.6 through v10.6.2, Mac OS X Server v10.6 through v10.6.2 Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution QuickTime CVE-ID: CVE-2010-0514 Available for: Mac OS X v10.6 through v10.6.2, Mac OS X Server v10.6 through v10.6.2 Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution QuickTime CVE-ID: CVE-2010-0515 Available for: Mac OS X v10.6 through v10.6.2, Mac OS X Server v10.6 through v10.6.2 Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution QuickTime CVE-ID: CVE-2010-0516 Available for: Mac OS X v10.6 through v10.6.2, Mac OS X Server v10.6 through v10.6.2 Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution QuickTime CVE-ID: CVE-2010-0517 Available for: Mac OS X v10.6 through v10.6.2, Mac OS X Server v10.6 through v10.6.2 Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution QuickTime CVE-ID: CVE-2010-0518 Available for: Mac OS X v10.6 through v10.6.2, Mac OS X Server v10.6 through v10.6.2 Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution QuickTime CVE-ID: CVE-2010-0519 Available for: Mac OS X v10.6 through v10.6.2, Mac OS X Server v10.6 through v10.6.2 Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution QuickTime CVE-ID: CVE-2010-0520 Available for: Mac OS X v10.6 through v10.6.2, Mac OS X Server v10.6 through v10.6.2 Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution QuickTime CVE-ID: CVE-2010-0526 Available for: Mac OS X v10.6 through v10.6.2, Mac OS X Server v10.6 through v10.6.2 Impact: Viewing a maliciously crafted MPEG file may lead to an unexpected application termination or arbitrary code execution Ruby CVE-ID: CVE-2009-2422, CVE-2009-3009, CVE-2009-4214 Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.2, Mac OS X Server v10.6 through v10.6.2 Impact: Multiple issues in Ruby on Rails Ruby CVE-ID: CVE-2009-1904 Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.2, Mac OS X Server v10.6 through v10.6.2 Impact: Running a Ruby script that uses untrusted input to initialize a BigDecimal object may lead to an unexpected application termination Server Admin CVE-ID: CVE-2010-0521 Available for: Mac OS X Server v10.5.8, Mac OS X Server v10.6 through v10.6.2 Impact: A remote attacker may extract information from Open Directory Server Admin CVE-ID: CVE-2010-0522 Available for: Mac OS X Server v10.5.8 Impact: A former administrator may have unauthorized access to screen sharing SMB CVE-ID: CVE-2009-2906 Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.2, Mac OS X Server v10.6 through v10.6.2 Impact: A remote attacker may be able to cause a denial of service Tomcat CVE-ID: CVE-2009-0580, CVE-2009-0033, CVE-2009-0783, CVE-2008-5515, CVE-2009-0781, CVE-2009-2901, CVE-2009-2902, CVE-2009-2693 Available for: Mac OS X Server v10.5.8, Mac OS X Server v10.6 through v10.6.2 Impact: Multiple vulnerabilities in Tomcat 6.0.18 unzip CVE-ID: CVE-2008-0888 Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8 Impact: Extracting maliciously crafted zip files using the unzip command tool may lead to an unexpected application termination or code execution vim CVE-ID: CVE-2008-2712, CVE-2008-4101, CVE-2009-0316 Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8 Impact: Multiple vulnerabilities in vim 7.0 Wiki Server CVE-ID: CVE-2010-0523 Available for: Mac OS X Server v10.5.8 Impact: Uploading a maliciously crafted applet may lead to the disclosure of sensitive information Wiki Server CVE-ID: CVE-2010-0534 Available for: Mac OS X v10.6 through v10.6.2, Mac OS X Server v10.6 through v10.6.2 Impact: An authenticated user may bypass weblog creation restrictions X11 CVE-ID: CVE-2009-2042 Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.2, Mac OS X Server v10.6 through v10.6.2 X11 CVE-ID: CVE-2003-0063 Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8, Mac OS X v10.6 through v10.6.2, Mac OS X Server v10.6 through v10.6.2 Impact: Displaying maliciously crafted data within an xterm terminal may lead to arbitrary code execution xar CVE-ID: CVE-2010-0055 Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8 Impact: A modified package may appear as validly signed |
|
![]() |
![]() |
![]() |
#17 | |
Senior Member
Iscritto dal: Feb 2008
Messaggi: 8340
|
Quote:
![]()
__________________
Powered by AlphaWinUX fixed by Sbiancamento Guida al downgrade del firmware per i Seagate Momentus XT MacBook Pro M4 14" 16/512 Logitech MX Master 3S - Edifier R1280DBs + SoundBlaster X4 Pa - no sped. Vendo Mac Mini M1 8/512 |
|
![]() |
![]() |
![]() |
#18 | |
Senior Member
Iscritto dal: Dec 2004
Città: Milano
Messaggi: 4631
|
Quote:
http://en.wikipedia.org/wiki/Mac_OS_X Ok, ibrido, Mach e Unix così va meglio??
__________________
MacBook Pro Early 2011, MacOs High Sierra- Apple Time Capsule 2Tb - iPhone 6s Plus Space Grey 128G |
|
![]() |
![]() |
![]() |
#19 | |
Senior Member
Iscritto dal: Dec 2004
Città: Milano
Messaggi: 4631
|
Quote:
Finche in un Os ci sarà un terminale con comandi del tipo: sudo\\ oppure chmod ebbene questo è un terminale Unix... Sta di fatto che se usi una qualsiasi distro Linux ci trovi più somiglianze con OSX di quante tu ne possa trovare in windows... PS Evita programmi porcate tipici di chi ha ancora una mentalità windows-oriented....Su Mac la spazzatura non fa danno, al limite occupa spazio, e 3 giga sinceramente non li ho mai visti in 1 anno che uso il mio Mac...E di smanettamenti ne ho fatti...Poi se vuoi fare quelle cose INUTILI tipo tgliere le lingue, gli Help, ecc..ecc.... fai pure...significa che non hai compreso appieno lo spirito apple...Su MAC si agisce SE e SOLO ci sono dei problemi evidenti...Il resto è inutile se non dannoso ![]() PPS OSX è un ottimo OS. Basta saperlo usare, come tutto a sto mondo ![]()
__________________
MacBook Pro Early 2011, MacOs High Sierra- Apple Time Capsule 2Tb - iPhone 6s Plus Space Grey 128G |
|
![]() |
![]() |
![]() |
#20 | |
Senior Member
Iscritto dal: Feb 2008
Messaggi: 8340
|
Quote:
cosa c'entra con quello che ho scritto io? ![]() ![]() ![]()
__________________
Powered by AlphaWinUX fixed by Sbiancamento Guida al downgrade del firmware per i Seagate Momentus XT MacBook Pro M4 14" 16/512 Logitech MX Master 3S - Edifier R1280DBs + SoundBlaster X4 Pa - no sped. Vendo Mac Mini M1 8/512 |
|
![]() |
![]() |
![]() |
Strumenti | |
|
|
Tutti gli orari sono GMT +1. Ora sono le: 02:05.