…if a company copied the Mac ROM into their computer, he would like to be able to do a demo during the trial, where he could type a few keystokes into an unmodified infringing machine, and have a large “Stolen From Apple” icon appear on its screen. The routines and data to accomplish that would have to be incorporated into our ROM in a stealthy fashion, so the cloners wouldn’t know how to find or remove it.
Have an amazing project to share? Join the SHOW-AND-TELL every Wednesday night at 7:30pm ET on Google+ Hangouts.
Join us every Wednesday night at 8pm ET for Ask an Engineer!
Learn resistor values with Mho’s Resistance or get the best electronics calculator for engineers “Circuit Playground” – Adafruit’s Apps!
Maker Business — Micro:bit Educational Foundation
Wearables — Ace accessorizing
Electronics — Pseudodifferential Measurement
Biohacking — Ahnjili Zhuparris: Internet Usage with Regards to Hormonal Changes
No comments yet.
Sorry, the comment form is closed at this time.