ixiboneheadixi
banned
can someone give me a detailed difference between mac and PC and keep it detailed but simple to easily understand, like all the difference between parts and the OS andeveything
2 things separate them. Operating system, and build quality.
OSX is the main difference, and via the T&C it can not be installed on a non apple branded computer (in those exact words). Basically meaning that in order to have the cutting edge, OSX OS, you have to pay out the bum for a little bit of hardware to run it legally. (if apple would open up to the custom market, they would get a lot more revenue).
asking a fanboy whats better. thats a good move.
Better:
Security -> OSX
gaming -> Windows (OSX is catching up)
efficiency -> OSX
business software -> OSX = Windows
CAD -> OSX
you see where this is going, right?
I have a PC. Its running Hackentosh (10.6.8).
I simply dont have the cash for a MBP or Macpro laying around. If I did, I would get ine in a heartbeat.
forum Rules said:Software Discussion Policy
Discussion of any of the following is NOT allowed at Computer Forum:
- Promoting piracy as an alternative to the legal purchase of computer software or media material.
- The use of torrent trackers or p2p software to obtain copyrighted material. Any discussion of programs like Limewire, Frostwire, eMule, eDonkey, etc.. is not allowed, whether or not you believe or suggest it's for legal use.
- The offer or solicitation of invitations to private torrent tracking websites, such as Demonoid. Public sites, like The Pirate Bay, cannot be discussed here.
- Illegally modified OS versions such as "XP Black," which are typically distributed illegally.
- Installation of a Macintosh operating system on a PC, also know as a "Hackintosh" system.
- Advice on how to crack or circumvent legitimate software activation. This includes: key generators; cracked executable files; re-arming software trial periods; brute force methods for obtaining activation keys; OEM activation hacks, etc.
- Cracking or bypassing an administrator/any other user log-in password.
- Stripping DRM from media files.
- DVD/Blu-Ray disk decryption.
- Software that facilitates the unauthorized entry into a network.
- Posting malicious links or attempting to distribute malicious software.
- Keystroke recording software, or any application that allows you to secretly monitor the activities of another computer user.