Feeds

Man buys new MacBooks, pulls them to bits, takes pics

Autopsy conducted

SANS - Survey on application security programs

Hardware hackers have already got their mitts on Apple's latest MacBook and MacBook Pro laptops - and taken the new notebooks to bits.

Inside the new MacBook
Inside the new MacBook

Top: Flip up the catch (highlighted) to reveal the battery and HDD
Then the innards...
Pictures courtesy iFixit.com

Actually, it looks quite easy: push in a flip-up catch to release the battery cover and you have access to the MacBook's battery and - retained by a single screw - HDD. Remove these and the remaining case screws, and the memory, logic board, optical drive, speakers and so on are right before you for inspection and removal.

Inside the new MacBook Pro

Inside the new MacBook Pro

Computer repair and spare-parts specialist iFixit, which conducted the disassembly of both new MacBooks, found that the bigger MacBook Pro is opened in the same way.

Inside the new MacBook Pro
Inside the new MacBook

The MacBook Pro mobo (top) and its little sibling's mainboard (bottom)

As iFixit notes, you can easily see the MacBook Pro's CPU, integrated chipset and discrete GPU part. The curved gaps are where the cooling fans go.

Inside the new MacBook

MacBook autopsy completed

Interestingly, the new notebooks use SATA optical drives rather than the parallel ATA-connected ones of old. And Apple's fitted the 802.11n Wi-Fi card into the screen assembly rather than the main body of the laptop.

Speaking of the screen, iFixit notes that the new aluminium-and-glass assembly weighs slightly less than the previous MacBook's plastic screen. But that glass makes the displays on both models very reflective.

You can see many more shots of the new MacBook Pro's insides - hi-res pics too - over at iFixit's website. Here's the link for the MacBook exploration

SANS - Survey on application security programs

More from The Register

next story
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.