Vulnerability Summary for the Week of April 6, 2015

Total Page:16

File Type:pdf, Size:1020Kb

Vulnerability Summary for the Week of April 6, 2015 Vulnerability Summary for the Week of April 6, 2015 Please Note: • The vulnerabilities are cattegorized by their level of severity which is either High, Medium or Low. • The !" indentity number is the #ublicly $nown %& given to that #articular vulnerability. Therefore you can search the status of that #articular vulnerability using that %&. • The !'S (Common !ulnerability 'coring System) score is a standard scoring system used to determine the severity of the vulnerability. High Severity Vulnerabilities The Primary Vendor --- Description Date CVSS The CVE Product Published Score Identity antlabs ** inngate The +NTlabs %nn,ate firmware on %, -.//, %, 2015-04-04 10.0 CVE-2015-0932 CERT-VN -./., %nn,ate -.0/ E, %nn,ate -.0. E, %nn,ate CONFIRM (link -.00 E, %nn,ate -.1/ E, %nn,ate -.0. ,, and is external) %nn,ate -.1/ , devices does not re1uire MISC (link is external) authentication for rsync sessions, which allows MISC (link is remote attac$ers to read or write to arbitrary external) files via T P traffic on #ort 23-. a#ache ** subversion The mod_dav_svn server in 'ubversion ..8.0 2015-04-08 7.8 CVE-2015-0202 MANDRIVA through ..8.1. allows remote attac$ers to cause (link is external) a denial of service (memory consum#tion) via a CONFIRM large number of 5EP65T re1uests, which trigger the traversal of 7'7' re#ository nodes. a#ache ** cassandra The default configuration in +#ache assandra 2015-04-03 7.5 CVE-2015-0225 BUGTRAQ ..2.0 through ..2.18, 0.0.0 through 0.0.1-, and (link is external) 0.1.0 through 0.1.3 binds an unauthenticated MLIST 9M:;5M% interface to all networ$ interfaces, MISC (link is external) which allows remote attac$ers to e<ecute arbitrary 9ava code via an 5M% re1uest. a##le ** a##le4tv %OH%&7amily in +##le i6' before 2.3, +##le 6' : 2015-04-10 7.2 CVE-2015-1095 CONFIRM (link before ./.1/.3, and +##le T! before 3.0 allows is external) CONFIRM (link #hysically #roximate attac$ers to e<ecute is external) arbitrary code or cause a denial of service CONFIRM (link (memory corru#tion) via a crafted H%& device. is external) APPLE (link is external) APPLE (link is external) APPLE (link is external) a##le ** a##le4tv The $ernel in +##le i6' before 2.3, +##le 6' : 2015-04-10 7.1 CVE-2015-1102 CONFIRM (link before ./.1/.3, and +##le T! before 3.0 does not is external) #ro#erly handle T P headers, which allows man* CONFIRM (link in*the*middle attac$ers to cause a denial of is external) CONFIRM (link service via uns#ecified vectors. is external) APPLE (link is external) APPLE (link is external) APPLE (link is external) a##le ** a##le4tv The $ernel in +##le i6' before 2.3, +##le 6' : 2015-04-10 7.5 CVE-2015-1103 CONFIRM (link before ./.1/.3, and +##le T! before 3.0 ma$es is external) routing changes in res#onse to % MP45"&%5" T CONFIRM (link messages, which allows remote attac$ers to is external) CONFIRM (link cause a denial of service (networ$ outage) or is external) obtain sensitive #ac$et*content information via APPLE (link is a crafted % MP #ac$et. external) APPLE (link is external) APPLE (link is external) a##le ** mac4os4< The :P im#lementation in +dmin 7ramewor$ in 2015-04-10 7.2 CVE-2015-1130 CONFIRM (link +##le 6' : before ./.1/.3 allows local users to is external) bypass authentication and obtain admin APPLE (link is #rivileges via uns#ecified vectors. external) a##le ** mac4os4< fontd in +##le Type 'ervices (+T') in +##le 6' : 2015-04-10 7.2 CVE-2015-1131 CONFIRM (link before ./.1/.3 allows local users to gain is external) #rivileges via uns#ecified vectors, a different APPLE (link is vulnerability than !"*0/.=*..-0, !"*0/.=* external) ..--, !"*0/.=*..->, and !"*0/.=*..-=. a##le ** mac4os4< fontd in +##le Type 'ervices (+T') in +##le 6' : 2015-04-10 10.0 CVE-2015-1132 before ./.1/.3 allows local users to gain CONFIRM (link is external) #rivileges via uns#ecified vectors, a different APPLE (link is vulnerability than !"*0/.=*..-., !"*0/.=* external) ..--, !"*0/.=*..->, and !"*0/.=*..-=. a##le ** mac4os4< fontd in +##le Type 'ervices (+T') in +##le 6' : 2015-04-10 7.2 CVE-2015-1133 CONFIRM (link before ./.1/.3 allows local users to gain is external) #rivileges via uns#ecified vectors, a different APPLE (link is vulnerability than !"*0/.=*..-., !"*0/.=* external) ..-0, !"*0/.=*..->, and !"*0/.=*..-=. a##le ** mac4os4< fontd in +##le Type 'ervices (+T') in +##le 6' : 2015-04-10 7.2 CVE-2015-1134 CONFIRM (link before ./.1/.3 allows local users to gain is external) #rivileges via uns#ecified vectors, a different APPLE (link is vulnerability than !"*0/.=*..-., !"*0/.=* external) ..-0, !"*0/.=*..--, and !"*0/.=*..-=. a##le ** mac4os4< fontd in +##le Type 'ervices (+T') in +##le 6' : 2015-04-10 7.2 CVE-2015-1135 CONFIRM (link before ./.1/.3 allows local users to gain is external) #rivileges via uns#ecified vectors, a different APPLE (link is vulnerability than !"*0/.=*..-., !"*0/.=* external) ..-0, !"*0/.=*..--, and !"*0/.=*..->. a##le ** mac4os4< The NV%&%+ gra#hics driver in +##le 6' : before 2015-04-10 7.2 CVE-2015-1137 CONFIRM (link ./.1/.3 allows local users to gain #rivileges or is external) cause a denial of service (NULL #ointer APPLE (link is dereference) via an uns#ecified %6'ervice external) userclient type. a##le ** mac4os4< @uffer overflow in %OH%&7amily in +##le 6' : 2015-04-10 7.2 CVE-2015-1140 CONFIRM (link before ./.1/.3 allows local users to gain is external) #rivileges via uns#ecified vectors. APPLE (link is external) a##le ** mac4os4< Launch'ervices in +##le 6' : before ./.1/.3 2015-04-10 7.2 CVE-2015-1143 CONFIRM (link allows local users to gain #rivileges via a crafted is external) localized string, related to a Atype confusionA APPLE (link is issue. external) a##le ** mac4os4< @uffer overflow in the ?niformType%dentifiers 2015-04-10 7.2 CVE-2015-1144 CONFIRM (link com#onent in +##le 6' : before ./.1/.3 allows is external) local users to gain #rivileges via a crafted APPLE (link is ?niform Type %dentifier. external) a##le ** <code %nteger overflow in the simulator in 'wift in 2015-04-10 7.5 CVE-2015-1149 CONFIRM (link +##le :code before B.3 allows conte<t* de#endent attac$ers to cause a denial of service is external) APPLE (link is or #ossibly have uns#ecified other im#act by external) triggering an incorrect result of a type conversion. arC4software ** @uffer overflow in 6#en*source +59 archiver 2015-04-08 7.5 CVE-2015-2782 MLIST (link is arC4archiver -.1/.00 allows remote attac$ers to cause a denial external) of service (crash) or #ossibly e<ecute arbitrary MLIST (link is code via a crafted +59 archive. external) DEBIAN c*board_moyu$u4#roject ?nrestricted file u#load vulnerability in 2015-04-05 7.5 CVE-2015-0877 CONFIRM (link ** c*board_moyu$u a##;lib;mlf.pl in *@6+5D Moyu$u before is external) ..0-b- allows remote attac$ers to e<ecute JVNDB (link is arbitrary code by u#loading a file with a D/ external) JVN (link is character in its name. external) ca ** s#ectrum + '#ectrum 8.2.x and 8.3.x before 8.3 H/0 does 2015-04-07 9.0 CVE-2015-2828 CONFIRM (link not #roperly validate serialized 9ava obCects, is external) which allows remote authenticated users to obtain administrative #rivileges via crafted obCect data. cisco ** unity_connection The onnection onversation Manager (a$a 2015-04-03 7.1 CVE-2015-0612 SECTRACK u sMgr) #rocess in isco ?nity onnection 2.5 (link is external) before 2.5(.)'?B, 2.6 before 2.B(0a)'?>, and 8.x CISCO (link is before 8.1(0)'?0, when '%P trun$ integration is external) enabled, allows remote attac$ers to cause a denial of service ('%P outage) via a crafted ?DP #ac$et, a$a @ug %& ' uh0=/B0. cisco ** unity_connection The onnection onversation Manager (a$a 2015-04-03 7.1 CVE-2015-0613 SECTRACK u sMgr) #rocess in isco ?nity onnection 2.5 (link is external) before 2.5(.)'?3, 2.6 before 2.B(0a)'?>, 8.x CISCO (link is before 8.1(0)'?0, and ./.0 before ./.0(.)'?., external) when '%P trun$ integration is enabled, allows remote attac$ers to cause a denial of service (core dum# and restart) via crafted '%P %NV%TE messages, a$a @ug %D ' ul2/>>>. cisco ** unity_connection The onnection onversation Manager (a$a 2015-04-03 7.1 CVE-2015-0614 SECTRACK u sMgr) #rocess in isco ?nity onnection 2.5 (link is external) before 2.5(.)'?3, 2.6 before 2.B(0a)'?>, 8.x CISCO (link is before 8.1(0)'?0, and ./.0 before ./.0(.)'?., external) when '%P trun$ integration is enabled, allows remote attac$ers to cause a denial of service (core dum# and restart) via crafted '%P %NV%TE messages, a$a @ug %D ' ul2B0B3. cisco ** unity_connection The call-handling im#lementation in isco ?nity 2015-04-03 7.1 CVE-2015-0615 SECTRACK onnection 2.= before 2.5(.)'?3, 2.6 before (link is external) 2.6(0a)'?>, 8.x before 8.1(0)'?0, and ./.0 before CISCO (link is ./.0(.)'?., when '%P trun$ integration is external) enabled, allows remote attac$ers to cause a denial of service (#ort consum#tion) by im#roperly terminating '%P sessions, a$a @ug %D ' ul22/28. cisco ** unity_connection The onnection onversation Manager (a$a 2015-04-03 7.1 CVE-2015-0616 SECTRACK u sMgr) #rocess in isco ?nity onnection 2.5 (link is external) before 2.5(.)'?3, 2.6 before 2.B(0a)'?>, and 8.x CISCO (link is before 8.1(0)'?0, when '%P trun$ integration is external) enabled, allows remote attac$ers to cause a denial of service (core dum# and restart) by im#roperly terminating '%P T P connections, a$a @ug %D ' ul682.8.
Recommended publications
  • Opencore Reference Manual (0.5.9::::::::: 0.6.0) [2020.07.05]
    OpenCore Reference Manual (0.5.90.6.0::::::::: ) [2020.07.05] Copyright ©2018-2020 vit9696 1 Introduction This document provides information on OpenCore user configuration file format used to setup the correct functioning of macOS operating system. It is to be read as the official clarification of expected OpenCore behaviour. All deviations, if found in published OpenCore releases, shall be considered documentation or implementation bugs, and are requested to be reported through Acidanthera Bugtracker. ::::::Errata :::::sheet::is::::::::available:::in OpenCorePkg repository.: This document is structured as a specification, and is not meant to provide a step by step algorithm for configuring end-user board support package (BSP). The intended audience of the document are programmers and engineers with basic understanding of macOS internals and UEFI functioning. For these reasons this document is available exclusively in English, and all other sources or translations of this document are unofficial and may contain errors. Third-party articles, utilities, books, and alike may be more useful for a wider audience as they could provide guide-like material. However, they are prone to their authors’ preferences, tastes, this document misinterpretation, and essential obsolescence. In case you use these sources, for example, Dortania’s OpenCore Desktop Guide and related material, please ensure to follow this document for every made decision and judge its consequences. Be warned that regardless of the sources used you are required to fully understand every dedicated OpenCore configuration option and concept prior to reporting any issues in Acidanthera Bugtracker. 1.1 Generic Terms • plist — Subset of ASCII Property List format written in XML, also know as XML plist format version 1.
    [Show full text]
  • Houdahspot Help EN
    HoudahSpot 5 User Guide houdah.com/houdahSpot 1. Introduction 4 2. What’s new in HoudahSpot 5 4 2.1. Folding Text Preview 5 2.2. Recent search attributes & values, locations, and columns 5 2.3. Quicker criteria setup 5 2.4. Arrange search results by kind, date, file size, or application 6 2.5. Compact Mode 6 2.6. Vertical layout 6 2.7. Enhanced grid view 6 2.8. Faster file tagging 7 2.9. Fewer windows 7 3. HoudahSpot and the Spotlight Index 7 3.1. macOS 10.15 Catalina 7 4. Workflow 8 4.1. The Search Field 8 4.2. Refine Search 9 4.2.1. Criteria Attributes 10 4.2.2. Using the Asterisk (*) Wildcard 14 4.2.3. Combining Criteria: ALL / ANY / NONE Groups 14 4.2.4. Find by Example 15 4.2.5. Snippets 16 4.2.6. Temporarily Disable Criteria Rows 16 4.3. Search Locations 17 4.3.1. Exclude Locations 19 4.4. Limit 19 4.5. Start / Stop Button 20 4.6. Results 20 4.6.1. Filter 22 4.6.2. File Actions 22 4.6.3. Details: File Info, Quick Look, Text Preview 24 4.6.4. Saving Search Results as Text Files 26 5. Customizing Default & Using Templates 27 HoudahSpot 5: User Guide 2 5.1. Saving Searches 27 5.2. Save as Default 27 5.3. Templates 28 5.4. Export as Finder Smart Folder 28 6. View Options 28 6.1. Search, Results & Details Pane 28 6.2. The Sidebar 30 6.3.
    [Show full text]
  • Eaglefiler 1.9.3 Manual
    EagleFiler 1.9.3 Manual C-Command Software c-command.com February 17, 2021 Contents 1 Introduction 6 1.1 Importing Is a Snap.........................................6 1.2 Familiar Mail-like Interface.....................................7 1.3 Search Everything..........................................8 1.4 The Library Is Open.........................................9 1.5 Reliable Data Storage........................................ 10 1.6 Add Tags and Notes......................................... 11 1.7 Speed Up and Simplify Your Other Applications......................... 14 1.8 Multiple Libraries.......................................... 14 1.9 Feature List.............................................. 14 2 Installing and Updating 18 2.1 Requirements............................................. 18 2.2 Installing EagleFiler......................................... 18 2.3 Updating From a Previous Version................................. 18 2.4 Reinstalling a Fresh Copy...................................... 19 2.5 Uninstalling EagleFiler........................................ 20 2.6 Security & Privacy Access...................................... 20 3 Using EagleFiler 23 3.1 Basics................................................. 23 3.2 Library Folders............................................ 24 3.3 What Can Be Imported....................................... 28 3.4 Ways to Import............................................ 29 3.4.1 Applications That Support Capture............................ 30 3.4.2 Importing Existing Files..................................
    [Show full text]
  • Characters and Numerics A
    1019 Index ■ > (is greater than) operator, 151, 183, 221, Characters and 252, 372, 382, 869 Numerics ° (degree sign) character, 501 – (en dash) character, 501 16-bit UCS/Unicode Transformation Format - (negation) operator, 150, 217, 219, 224, (UTF-16)encoded files, 497–499 258, 379–380, 386 " (double quote character), 145, 163, 170– - (subtraction) operator, 149–150, 217, 219, 172, 263, 311 224–225, 254–255, 380, 385 1st keyword, 131 - button, Folder Actions Setup utility, 722 2nd keyword, 131 != symbol, 222 3rd keyword, 131 % symbol, 889 24U Appearance, 689 & operator, concatenating strings with, 952 32-bit, scripting additions, 686 (* symbol, 48 444 mode, 891 * (multiplication) operator, 150, 217, 224, 8-bit UCS/Unicode Transformation Format 380 (UTF-8) encoded files, 493, 497, *) symbol, 48 501, 871, 877 / (division) operator, 151, 217, 224, 380, 385 / (slash character), 193, 473 /Library/Scripts/ folder, 73–74, 310 ■ A : (colon character), 472 a reference to operator, 328, 347, 379, 388, ? operator, 372 479–480 \ (backslash character), 171 AAC (Advanced Audio Coding) format, \b construct, 703 Apple, 757 \n (line feed) character, 172–173, 179 About Downloads.pdf file, 475 \r (return) characters, 172–173, 486 about label, 515 \t (tab) character, 172–173, 791 above label, 515 \w modifier, 703 abs_num command, 219 ^ (exponent) operator, 151, 216–217, 220– abs_num handler, 219 221, 224, 380 absolute path, 875 + (addition) operator, 150, 217, 224–225, absolute reference, 96 254, 380, 385 abstract base class, 564 + button, Folder Action
    [Show full text]
  • OS X Yosemite
    OS X Yosemite Core Technologies Overview October 2014 Core Technologies Overview 2 OS X Yosemite Contents Page 4 Introduction Page 5 System Startup BootROM EFI Kernel Drivers Initialization Address Space Layout Randomization (ASLR) Compressed Memory Power Efficiency App Nap Timer Coalescing Task-Level Scheduling Page 10 Disk Layout Partition Scheme Core Storage File Systems Page 13 Process Control Launchd Loginwindow Grand Central Dispatch Sandboxing Gatekeeper XPC Page 20 Network Access Ethernet Wi-Fi Multihoming IPv6 IP over Thunderbolt Network File Systems Access Control Lists Directory Services Remote Access Bonjour Core Technologies Overview 3 OS X Yosemite Page 27 Document Lifecycle Auto Save Automatic Versions Document Management Version Management Continuity Extensions iCloud Storage Page 31 Data Management Spotlight Time Machine Page 34 Developer Tools Xcode Swift LLVM Instruments Accelerate Automation WebKit Page 41 For More Information Core Technologies Overview 4 OS X Yosemite Introduction With more than 83 million users—consumers, scientists, animators, developers, and system administrators—OS X is the most widely used UNIX® desktop operating system. In addition, OS X is the only UNIX environment that natively runs Microsoft Office, Adobe Photoshop, and thousands of other consumer applications—all side by side with traditional command-line UNIX applications. Tight integration with hardware— from the sleek MacBook Air to the powerful Mac Pro—makes OS X the platform of choice for an emerging generation of power users. This document explores the powerful industry standards and breakthrough innovations in the core technologies that power Apple’s industry-leading user experiences. We walk you through the entire software stack, from firmware and kernel to iCloud and developer tools, to help you understand the many things OS X does for you every time you use your Mac.
    [Show full text]
  • Document-Based App Programming Guide for Mac Contents
    Document-Based App Programming Guide for Mac Contents About the Cocoa Document Architecture 7 At a Glance 7 The Model-View-Controller Pattern Is Basic to a Document-Based App 8 Xcode Supports Coding and Configuring Your App 8 You Must Subclass NSDocument 8 NSDocument Provides Core Behavior and Customization Opportunities 8 Prerequisites 9 See Also 9 Designing a Document-Based App 10 Documents in OS X 10 The Document Architecture Provides Many Capabilities for Free 11 Storing Documents in iCloud 12 The Document Architecture Supports App Sandbox 13 Considerations for Designing Your Document Data Model 13 Cocoa Uses the Model-View-Controller Design Pattern 13 A Data Model Corresponds to a Document Type 13 Data Model Storage 14 Handling a Shared Data Model in OS X and iOS 15 The Classes That Support Document-Based Apps 16 NSDocumentController Creates and Manages Documents 17 NSDocument Presents and Stores Document Data 18 NSWindowController Manages One Document Window 19 Subclassing Objects in the Document Architecture 21 You Must Subclass NSDocument 21 You Should Subclass NSWindowController 22 You Rarely Need to Subclass NSDocumentController 24 App Creation Process Overview 26 Xcode Provides a Document-Based App Template 26 Create the Project 27 Create Your Document Window User Interface 28 Review Your App Menu Bar Commands 28 2012-12-13 | Copyright © 2012 Apple Inc. All Rights Reserved. 2 Contents Complete the Information Property List 29 Export Custom Document Type Information 32 Implement the NSDocument Subclass 33 Create Any Additional
    [Show full text]
  • Applescript: a Beginner's Guide" & Tab & Tab & "Chapter 14"
    AppleScript: A Beginner’s Guide About the Author Guy Hart-Davis is the author of Mac OS X Leopard QuickSteps, How to Do Everything: iPod, iPhone, & iTunes, HTML, XHTML & CSS QuickSteps, and several other equally fine computer books. About the Technical Editor Greg Kettell is a Windows programmer by day, but by night loves his Mac. Greg has served as an author, contributing author, and/or technical editor for an ever-increasing number of technical books. AppleScript: A Beginner’s Guide Guy Hart-Davis New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto Copyright © 2010 by The McGraw-Hill Companies. All rights reserved. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher. ISBN: 978-0-07-163955-2 MHID: 0-07-163955-1 The material in this eBook also appears in the print version of this title: ISBN: 978-0-07-163954-5, MHID: 0-07-163954-3. All trademarks are trademarks of their respective owners. Rather than put a trademark symbol after every occurrence of a trademarked name, we use names in an editorial fashion only, and to the benefit of the trademark owner, with no intention of infringement of the trademark. Where such designations appear in this book, they have been printed with initial caps. McGraw-Hill eBooks are available at special quantity discounts to use as premiums and sales promotions, or for use in corporate training programs.
    [Show full text]
  • Tools for File Format Identification, Validation and Characterization
    Tools for File Format Identification, Validation and Characterization Bill Underwood Georgia Tech Research Institute Atlanta, Georgia, USA CurateGear Chapel Hill, NC January 9, 2013 GTRI_B-‹#› Filename - 1 Motivation: Digital Curation Tools Digital Curators need automated tools for: • Identification of file formats • Validation of file formats, with pertinent error messages • Extraction of metadata • Viewing/playing/reading file formats • Conversion of legacy formats to current/standard formats GTRI_B-‹#› Filename - 2 Motivation Digital Curation Tools • Identification: DROID/PRONOM; File/Magic • Validation: Harvard's JSTOR/Harvard Object Validation Environment (JHOVE), UCDL (JHOVE2) • Metadata Extractor: National Library of NZ Metadata Extractor; GNU libextractor • Viewers/Players: NASAView, QuickView Plus, IrfanView, XNView, KeyView, Columbus viewer • Conversion: XML Electronic Normalization of Archives (Xena), OpenOffice.org’s Format Converter, Alchemy GTRI_B-‹#› Filename - 3 Definitions • A file format is a set of rules for encoding and decoding data or computer instructions in a file. • A file type is a class of files with the same file format. • A file format signature is invariant data in a file format that can be used to identify the file type (or format) of a file GTRI_B-‹#› Filename - 4 External File Format Identifiers • File Name Extensions • Metadata stored in the operating system • MacOS HFS Creator Code & File Type Code • MacOS X Uniform Type Identifier (UTI) • Multipurpose Internet Mail Extensions (MIME) media types • PRONOM Persistent Universal Identifier (PUID) GTRI_B-‹#› Filename - 5 Linux File Command and Magic File • Unix (Linux) File Command and Magic File are probably the most widely used tool for file format identification. • Magic number is the term used for the concept of an internal file format signature.
    [Show full text]
  • OS X 10.8 Mountain Lion Das Umfassende Handbuch Inhalt
    Kai Surendorf OS X 10.8 Mountain Lion Das umfassende Handbuch Inhalt Inhalt Vorwort ......................................................................... 21 Einleitung .............................................................. 23 1 Neuerungen in OS X 10.8 ................... 27 TEIL I Mit OS X 10.8 arbeiten 2 Effizient mit OS X 10.8 arbeiten 2.1 Ein paar Anmerkungen zum Dock ....................... 33 2.2 Die Fenster im Griff ............................................. 38 Voreinstellungen .................................................. 39 Die Titelleiste ....................................................... 40 Die Symbolleiste anpassen ................................... 41 Mission Control, Monitore und der Vollbildmodus ...................................................... 42 Das Launchpad .................................................... 49 2.3 Wiederherstellen und Versionen ......................... 51 Fenster wiederherstellen ...................................... 51 Automatisch sichern ............................................. 52 Abschließende Anmerkungen ............................... 54 2.4 Die Menüleiste und ihre Extras ........................... 54 2.5 Die Mitteilungszentrale ...................................... 55 2.6 »Bereitstellen« und soziale Netzwerke ................ 58 Twitter ................................................................. 58 Facebook ............................................................. 58 2.7 Die Dienste ......................................................... 60
    [Show full text]
  • Packaging Rusty Myers
    PSUMAC208: PACKAGING RUSTY MYERS • Penn State University, Systems Administrator;Classroom and Lab Computing OVERVIEW • What Are Packages • Why Use Packages • How to Use Packages • Demo Time QUICK AUDIENCE SURVEY • Created a Package? • Iceberg? PACKAGE INSTALLERS WHAT PACKAGES DO • User Installer.app /System/Library/ CoreServices/ • Installs Files & Applications • Run Scripts PACKAGE SETTINGS • Product Information Title, Description, Welcome, Read Me, License... • Package Properties: Package Identifier, Version... • Installation Properties System, Volume, & Authentication Requirements... • Install Operations Pre & Post flight, install, upgrade From: http://developer.apple.com/mac/library/documentation/DeveloperTools/Conceptual/SoftwareDistribution/Managed_Installs/Managed_Installs.html#//apple_ref/doc/uid/10000145i-CH6-SW9 Product information: Title Description Welcome file Read Me file License file Conclusion file Package properties: Package identifier Package version number Resource fork processing Installation properties: System requirements Volume requirements Authentication requirement Allowance for choosing an installation volume other than the boot volume Installation destination on the installation volume Relocation consent (the ability user may have to change the installation destination) Revert consent Directory-permissions overwrite Postinstallation process action Install operations: Preflight Preinstall/Preupgrade Postinstall/Postupgrade Postflight PACKAGE INSTALLERS WHAT ARE PACKAGES • File Directory or Flat File • Appears as single
    [Show full text]
  • Mac OS X Snow Leopard
    Kai Surendorf Mac OS X Snow Leopard Das umfassende Handbuch Inhalt INHALT Vorwort ................................................................................ 17 Einleitung ............................................................................. 19 Der Aufbau des Buches .......................................................... 20 Die Webseite zum Buch ......................................................... 21 1 Einige Neuerungen in Mac OS X 10.6 .................... 23 TEIL I Mit Mac OS X 10.6 arbeiten 2 Effizient mit Mac OS X arbeiten ............................ 31 2.1 Ein paar Anmerkungen zum Dock ............................. 31 2.2 Die Fenster im Griff .................................................. 34 2.2.1 Die Titelleiste ............................................... 34 2.2.2 Symbolleisten anpassen ............................... 36 2.2.3 Exposé im Detail .......................................... 37 2.2.4 Arbeitsflächen mit Spaces ............................ 40 2.3 Die Menüleiste und ihre Extras ................................. 43 2.4 Die Dienste .............................................................. 44 2.5 Mit Texten arbeiten .................................................. 47 2.5.1 Text markieren und bearbeiten..................... 47 2.5.2 Rechtschreibung und (englische) Grammatik ................................. 47 2.5.3 Symbol- und Textersetzung .......................... 49 2.5.4 Schrift zuweisen .......................................... 50 2.5.5 Die Zeichenpalette .....................................
    [Show full text]
  • Tinkertool System Release 2 Reference Manual Ii
    Documentation 0381-1137/2 TinkerTool System Release 2 Reference Manual ii Version 3.7, June 25, 2018. US-English edition. MBS Documentation 0381-1137/2 © Copyright 2003 – 2018 by Marcel Bresink Software-Systeme Marcel Bresink Software-Systeme Ringstr. 21 56630 Kretz Germany All rights reserved. No part of this publication may be redistributed, translated in other languages, or transmitted, in any form or by any means, electronic, mechanical, recording, or otherwise, without the prior written permission of the publisher. This publication may contain examples of data used in daily business operations. To illustrate them as completely as possible, the examples include the names of individuals, companies, brands, and products. All of these names are fictitious and any similarity to the names and addresses used by an actual business enterprise is entirely coincidental. This publication could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. The publisher may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice. Make sure that you are using the correct edition of the publication for the level of the product. The version number can be found at the top of this page. Apple, Mac OS X and FireWire are registered trademarks of Apple Inc. Microsoft is a registered trademark of Microsoft Corporation. Firefox and Camino are registered trade- marks of Mozilla Foundation. OmniWeb is a trademark of The Omni Group. Opera is a trademark of Opera Software ASA.
    [Show full text]