Feeds

Man buys new MacBooks, pulls them to bits, takes pics

Autopsy conducted

SANS - Survey on application security programs

Hardware hackers have already got their mitts on Apple's latest MacBook and MacBook Pro laptops - and taken the new notebooks to bits.

Inside the new MacBook
Inside the new MacBook

Top: Flip up the catch (highlighted) to reveal the battery and HDD
Then the innards...
Pictures courtesy iFixit.com

Actually, it looks quite easy: push in a flip-up catch to release the battery cover and you have access to the MacBook's battery and - retained by a single screw - HDD. Remove these and the remaining case screws, and the memory, logic board, optical drive, speakers and so on are right before you for inspection and removal.

Inside the new MacBook Pro

Inside the new MacBook Pro

Computer repair and spare-parts specialist iFixit, which conducted the disassembly of both new MacBooks, found that the bigger MacBook Pro is opened in the same way.

Inside the new MacBook Pro
Inside the new MacBook

The MacBook Pro mobo (top) and its little sibling's mainboard (bottom)

As iFixit notes, you can easily see the MacBook Pro's CPU, integrated chipset and discrete GPU part. The curved gaps are where the cooling fans go.

Inside the new MacBook

MacBook autopsy completed

Interestingly, the new notebooks use SATA optical drives rather than the parallel ATA-connected ones of old. And Apple's fitted the 802.11n Wi-Fi card into the screen assembly rather than the main body of the laptop.

Speaking of the screen, iFixit notes that the new aluminium-and-glass assembly weighs slightly less than the previous MacBook's plastic screen. But that glass makes the displays on both models very reflective.

You can see many more shots of the new MacBook Pro's insides - hi-res pics too - over at iFixit's website. Here's the link for the MacBook exploration

Combat fraud and increase customer satisfaction

More from The Register

next story
WTF happened to Pac-Man?
In his thirties and still afraid of ghosts
Reg man builds smart home rig, gains SUPREME CONTROL of DOMAIN – Pics
LightwaveRF and Arduino: Bright ideas for dim DIYers
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Apple patent LOCKS drivers out of their OWN PHONES
I'm sorry Dave, I'm afraid I can't let you text that
Microsoft signs Motorola to Android patent pact – no, not THAT Motorola
The part that Google never got will play ball with Redmond
Happy 25th birthday, Game Boy!
Monochrome handset ushered in modern mobile gaming era
Slip your finger in this ring and unlock your backdoor, phone, etc
Take a look at this new NFC jewellery – why, what were you thinking of?
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
prev story

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.