Feeds

Hackintosher emerges from bankruptcy

And that's the bad news

3 Big data security analytics techniques

The on-again, off-again slugfest between Apple and Hackintosher Psystar has taken yet another turn - and this one puts the feisty Floridians in a bit of a bind.

The US Bankruptcy Court for the Southern District of Florida has granted Psystar's request to dismiss its Chapter 11 bankruptcy case. But there's a twist: The presiding judge, Robert A. Mark, has stipulated that the Hackintoshers can't delay their upcoming trial with Apple (scheduled to begin on January 11, 2010) by refiling for bankruptcy protection.

The exact period of the injunction against filing is unclear, as the dismissal order states "that this case is dismissed with prejudice to the filing of a petition under Chapter 11 of the Bankruptcy Code for a period of six (12) months from the date of this Order."

Calls to Psystar's lawyers to clarify if the period during which Psytar is barred from another bankruptcy filing is six months or 12 months were not returned.

The inability of Psystar to protect itself under the shield of bankruptcy not only prevents it from ducking the upcoming Apple trial - US law automatically puts a stay on court proceedings against companies under Chapter 11 bankruptcy protection - but it also exposes the Hackintosher to legal actions which might be filed by its other creditors.

And there are plenty of them. When Psystar filed for bankruptcy in May of this year, court documents showed the company to be about $260,000 in debt.

This June, Apple successfully petitioned the Florida court to lift the automatic stay. And now Judge Mark has blocked Psystar from using the same bankruptcy dodge.

And so Psystar stand exposed. But it remains unbowed. In a recent post to its company blog entitled "The Circus Comes To Town," the spunky defendants told the world that Apple's lawyers were on their way to observe their facilities during the trial's discover phase, saying that "We believe the only thing they will discover is what we have been open about from the start, and of course the scorching Florida heat."

Psystar also said that they are "developing an addition to this Community site detailing an overview of the case and any relevant materials." We look forward to reading their take on the entire saga.

As Psystar's blogger wrote to end his "Circus" posting, "Stay tuned..." ®

SANS - Survey on application security programs

More from The Register

next story
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
True optical zoom coming to HTC smartphone cameras
Time to ditch that heavy DSLR? Maybe in a year, year and a half
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Leaked photos may indicate slimmer next-generation iPad
Will iPad Air evolve into iPad Helium?
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.