Brutal Deluxe Adds Numerous Cassettes to Apple II Collection


Brutal Deluxe software has added a number of cassettes to their Apple II cassette collection.   The library, maintained by Antoine Vignau, has now grown to 633 cassettes over the life of the library.  New additions to the collection include the following programs: Creative computing software: Voodoo castle adventure Innovative computer programs (by Ron Graff): The […]

Kansasfest Registration Opens


Registration for Kansasfest, the only convention dedicated to the Apple II computer has officially opened for Registration.  The 2015 event will include a keynote given by famed programmer Becky “Burger” Heineman.  According to the press release from the Kansas Fest comittee, KANSAS CITY, MO — April 10, 2015 — KansasFest, the 27th annual convention dedicated […]

Don Worth’s Disassembly of DOS 3.2 Posted on


Mike Maginnis has announced the posting of Don Worth’s dis-assembly of Apple II Dos 3.2/  The document was scanned many years ago by Apple Historian David Craig and is a hand signed copy of Don’s personal copy of the dis-assembly.  You can download the document for free from the Apple II Scans website at:

The Northern Spy — Buying Spree


The Spy has it on good authority that iTim is about to iCook up a major purchase–one that will rock merely the high-tech sector, but the entire business world. What follows is a partial transcript of a larger interview, with the Spy’s sometime erstwhile assistant, coder extraordinaire, workhorse novel character, and chief head banger Nellie […]

Open Apple Podcast # 45 Published


Mike Maginnis, host of the Open Apple Podcast announced the release of the 45th edition of the podcast.  According to his posting, This month, we sit down with Mark Kriegsman, author of Star Blaster, and a modern Apple II hacker. He has ported the awesome FastLED driver library to the Apple II, so you can […]

OS X Vulnerable to DLL Hijacking


According to a detailed article by Patrick Wardle, OS X with Gatekeeper is vulnerable to attack from applications loading dynamic link libraries (DLLs) that don’t specify a path name. “The operating system looks for the DLL file in a number of well-defined directories. An attacker could thus ‘hijack’ the DLL by placing a rogue DLL […]