Microsoft Windows Vista compared to Apple Mac OS X

“Gartner Group took a good look at Windows Vista, Microsoft’s next-generation operating system. The analyst reports back on some ten issues that stir mixed feelings among preview users. IT-Enquirer took the most spectacular and most interesting to publishers and compared with Mac OS X where appropriate,” IT-Enquirer reports.

IT-Enquirer looks at the following areas:
• Integrated Search With Document Orientation
• User Account Protection
• Full Volume Encryption With TPM 1.2 Support
• Inbound/Outbound Personal Firewall
• Web browser

Full article here.

Advertisements: The New iMac G5. Built-in camera and remote control. From $1299. Free shipping.
Apple USB Modem. Easily connect to the Internet using your dial-up service. $49.00.
The New iPod with Video. The ultimate music & video experience on the go. From $299. Free shipping.
Connect iPod to your television set with the iPod AV Cable. Just $19.00.

Related MacDailyNews articles:
Thurrott: Microsoft’s Windows Vista Beta 1 vs. Apple’s Mac OS X Tiger (Part 2) – November 29, 2005
Thurrott: Microsoft’s Windows Vista Beta 1 vs. Apple’s Mac OS X Tiger – August 29, 2005
Apple to unleash Leopard on Microsoft’s Windows Longhorn; Mac OS X 10.5 due late 2006 – early 2007 – June 07, 2005

23 Comments

  1. Why won’t they wait until Vista is actually a shipping product and then compare it with the next version of OS X that will have already shipped by that time, too? (Yes, that’s rhetorical. Just seems completely silly to try to compare Apples and maggots.)

  2. Oh yeah, comparing a completed OS X with a work-in-progress makes a lot of sense. Seems that this guy was scraping the bottom of the barrel to come up with a topic. Besides, there is NO comparison with Vista and OS X anyway, completed or not.

  3. Gartner is a research group ABOVE all else. They make money by selling reports. It is not unreasonable for them to compare the latest public Beta builds of the world’s largest OS vendor. I am _glad_ they are giving the attention to Tiger that they are.

    Be patient, there will be more Vista/Leopard reviews than you will know what to do with. Until then, enjoy the laughs as Microsoft attempts to copy Tiger.

  4. “A mixed query, both on servers and local disks is not (yet) possible.”

    Ummm… Try hitting the others button in search .. you can select Servers and Local disks.

    This whole article is riddled with wrongness!

  5. Mac’s need a outgoing Firewall

    Right now we all use Little Snitch (god bless them), but it’s amazing how a security concious Apple is caving into snitchware and developers who want to report on everything we do with our Mac’s.

    DO YOU KNOW SUPERDUPER PHONES HOME!!

    Not good for a program that takes your admin password, now what would happen if someone used a trojan to alter SuperDuper?

    Did you know that Address Book contacts Apple servers even if you don’t have a .Mac account?

    Did you know with the recent 10.4.3 update the DOCK phones Apple?

    We are more at risk from sneaky programs sending data out of our machines than from hackers and viruses getting in.

  6. The story is not a comparison between an already robust and existing OS and the M$ equivelent because the M$ version does not exist yet!

    When will these dudes stop this mindless comparison shite! OSX 10.4. exists and will be OSX 10.5. before we see any vista from M$.

    They are clinging at straws and trying to compensate for a company that once led the pack and is sadly now letting the unknown numbers of lemmings of the world down sadly.

    It writers my sad ass! Most don’t know anything past their noses.

    I recently showed my 17″ PowerBook to a couple of friends from South Africa and Denmark and both just loved the thing but were afraid they could not drive it.

    After 10 minutes of my expert tuition they could grasp the finder and relate to the machine. Something they thought would be scary and difficult became easy and accessible. They both said they nwere afraid to learn a new system. Once they knew how easy it was they wanted to play with it and explore.

    I even convinced them that something like an iBook with all the iLife apps is affordable and better value than a black bakerlite box from Dell and partners.

    Two possible more switchers. Both had never seen a mac before I showed them.

    ROCk on MAC.

  7. “Did you know that Address Book contacts Apple servers even if you don’t have a .Mac account?”

    What does it contact Apple servers about?
    How does it do it if you’re not online?

    “Did you know with the recent 10.4.3 update the DOCK phones Apple?”

    What does the Doc phone Apple about?

  8. Good lord what a crappy article.

    Basically it’s: Here’s a feature that might be in Vista when it ships… that sounds neato but we haven’t really seen any production level code. And guess what? OSX doesn’t have the same feature.

    Plus most of the features are dubious anyway. Desktop searching across the enterprise… Encrypting volumes w/ some onboard palladium type chip… some bullshit about dynamic user access control that apparently elevates processes’ privileges for the lifetime of the process. Which is just plain stupid so it’s probably just a typo. Assuming it is a typo then it sounds like there is going to be NO END of holes in the implementation.

    Don’t follow the link. You’re wasting your time and just giving them hits.

  9. To the “other” Mac Dude…

    Thanx for the info… I did not know that…

    Question:

    Is there any way to set “Little Snitch” to stop ALL
    calls home (from everything) …. without having that annoying pop up asking me if this or that is ok ?

    And at the same time… not interferring with legit uploading ??

    (I’m a newbie with Snitch .. so go easy on me)

  10. It seems reasonable to provide some sort of view that will answer potential switchers or visters questions. “Do I wait for the next big thing or get something that’s better than what I have now?” That’s the question being answered here. Apple is very quiet about 10.5 and there is no reason not to be. Without question Microsoft has been photocopying and basing their feature sets on what Apple does. Without telling MS what’s coming Apple has a chance to compete. Vista is like a concept car: you see something that might become available, but it’s going to be about 3/4 of what was displayed. Leopard is like a spyshot of a production vehicle in testing: it exists, but before it hits the market it’s going to be rock solid and the only clue the competition has is that it is at least 25% different than any concept shown. With no concept except Tiger we are left with a stealth OS. Sure, there’s no hype…but then you don’t need to skip Beta 2 in order to release Leopard on time.

    The Dock calls home so it’s bad, but another Application is bad because it calls home and asks for the admin password. OK, except the OS asks for and knows the Admin password. The OS calls home w/ software update. Apple has been calling home for years and there hasn’t been an exploit (other than making things work on machines NOT running Mac OS X). As for a third party app that asks for your password…it’s a matter of trust. If you don’t know what you are buying or installing then don’t install the rm -rf * script that asks for your password. Otherwise stop trippin on the ‘Apple product that contacts Apple’ tip.

    Criteria for a firewall blocking outgoing connections? Idiot user or remote exploit that has not happened for OS X yet. It’s stuff you installed ok. It’s what you’re doing. If the OS has protections from what comes back (which is what incoming does) then the only thing that can be compromised is your privacy. Do you send email and type in browse the web? OK you’re sending out info. If you use gmail you need not apply to the paranoia club. The plain and simple fact is that MS NEEDS an outgoing firewall because there are tons of remote exploits for windows and the security controls allow any new machine to require trashing or reinstallation within 6 months. Not so Apple (not that it’s difficult for Apple to change the firewall and keep the same interface!!)

  11. Nobody cares. Even among Windows users there doesn’t seem to be any interest, much less excitment over Vista. Ask any Windows users you know about Vista odds are most haven’t heard of it and the rest won’t be standing in line for it because XP is “good enough.” I could be dead wrong but my bet there will be no mad stampede to upgrade (sic) to Vista from XP. Of course at its current rate Vista will be staggering into the marketplace about the same time we’re all upgrading to OS X 10.7 “Sabertooth.”

  12. This has got to be the millionth time someone wrote an article on this subject. When will these idiots finally stop having this terrific epiphany to write an article comparing operating systems?

  13. – – – – – – – – – – – – – – – – – – – – – –
    <u>Vista Application [ Exploder ] blocked a popup</u>.

    [ ] To <u>s</u>ee this popup click here
    [ ] Click here to turn <u>o</u>ff all blocking
    [ ] Click here to turn <u>o</u>n blocking for non-Microsoft sites only
    [ ] Click here if you’re not <u>s</u>ure what to do
    [ ] <u>D</u>on’t click this unless you know what you’re doing
    [ ] Click here for really, really <u>A</u>dvanced options

    – – – – – – – – – – – – – – – – – – – – – –

    – – – – – – – – – – – – – – – – – – – – – –
    <u>VISTA SECURITY ALERT</u>

    To help protect your computer, Winnows Firewall has blocked
    the program from receiving unsolicited information from the
    internet or a network.

    Name: Macrosoft Orifice FontPuke
    Publisher: Macrosoft Corporation

    [ ] <u>U</u>nblock this program, despite the security risk
    [ ] <u>B</u>lock this program, despite the security risk
    [ ] Keep blocking this program, <u>s</u>ometimes
    [ ] Keep blocking this program, but ask me again <u>l</u>ater
    [ ] <u>U</u>nblock all information from Microsoft trusted sites
    [ ] <u>C</u>lick here to see what all the above means
    [ ] Click <u>h</u>ere for a popup with further options
    [ ] Click here for really, really <u>A</u>dvanced options

    – – – – – – – – – – – – – – – – – – – – – –

    – – – – – – – – – – – – – – – – – – – – – –
    <u>REALLY, REALLY ADVANCED OPTIONS</u>

    Enter your valid hotmail address [_______________]
    Enter your trusted I.T. gamertag [_______________]
    Enter four-letter password [<u>xxx </u>]

    [ ] I.T. Managers click here to receive your <u>$</u>50 bonus
    [ ] Click here to express your <u>g</u>ratitude to the Chief S’ware Architect

    – – – – – – – – – – – – – – – – – – – – – –

    [ ] Click here if I fcked up the formatting (no reposts)

  14. To those who asked “what” Apple sends out in the Address Book and Dock is not know to me. But it occurs regardless.

    Little Snitch has a preference pane in your System Preferences that you can create a “New Rule” to take a application and either block all outgoing or tailor it so it only connects to certain servers/ports.

    You can also set a general rule to say program A to deny all connections and then set a another rule after that to A only connect to server ip 22.44.66.77 on port 80 for example.

    For example if you want Address Book to never connect, when it pops up simply select “Deny” “Forever” and the Rule will be made in the Little Snitch Preference Pane. Delete all “User Defined Rules” to set things back to default.

    Computers connect to each other using IP addresses (numbers) which is the first four sets of numbers 207.46.130.108 if you find a fifth set, it’s the port the connection is on. Say 207.46.130.108:80 which is Microsoft.com on port 80.

    Use Network Utility “Whois” to find the first four sets to find who the IP number belongs to.

    Use the Advanced features of Mac OS X’s Firewall and the log to view what computers are attempting to connect to your machine and on what port. Do a “Whois” to find out what’s going on.

    Use this site to have them check your ports for entry possibilities.

    http://scan.sygate.com/

  15. Oh I forgot, web bugs.

    These are nasty things, when you visit a website the browser is told by the website to connect to certain ports and IP addresses.

    For instance a malicious website could have Safari download something, usually the intention is good, like a video or something, but it can be used for bad things.

    Little Snitch blocks these connection attempts, marketing data etc.

Reader Feedback

This site uses Akismet to reduce spam. Learn how your comment data is processed.