Catalog 05/07.Indd

Total Page:16

File Type:pdf, Size:1020Kb

Catalog 05/07.Indd Software Library Listing July 2005 1 INTRODUCTION This is a catalog of all of the files maintained in the Keystone MacCentral Software Library. The Library can be obtained on CD by request. The library requires two CDs. Normally we will provide one full CD with the latest files. These will be programs that require OS X or in some cases Classic. Please specify if you require the complete library. DOMs Disks Of the Month are arbitrary collections of files. They have been downloaded from the Net. The web sites are included in the documentation so that you may download directly from the source. ROMs In September of 1998, we featured MacMAME as our Disk Of the Month (DOM 98/09.) In a nutshell, MacMAME attempts to emulate as closely as possible the original hardware of the early eighties arcade games. It does this by fooling the original program code, contained in ROM chips, into thinking they are running inside the real machine when in reality they are running on your Mac. MAME, which stands for Multi-Arcade Machine Emulator, is the product of a group of people who have teamed up to emulate as many of these games as possible. This is a list of the games that we have in our library in the DOM 98/09 folder. SOUND BYTES This portion of our catalog lists the names of the various sound bytes, that we have in our library. The five folders are arranged by type of sound. About .seas and .sits Many of the files are .sea files. The .sea is an acronym for Self Extracting Archive. Double clicking a .sea file causes it to expand into a useable file or folder. On the other hand, .sit files are compressed files that require StuffIt Expander. StuffIt Expander is a free utility that is available from many sources. About DAs DAs are Desk Accessories. In the early days, the Mac was limited to a single running program in RAM. The desk accessories were a workaround. They were small programs installed in the System. They could be invoked by selecting one or more entries in the Apple menu. With the introduction of Switcher and Multifinder, they became less important. System 7 did away with the Desk Accessory concept altogether. There are some gems in this group of programs. However, you have to work to dig them out. Double click on a DA to open a window which will reveal the actual program. The program must be dragged out of window before it will run properly in System 7 and after. Trash the original, now empty, DA. By the way, that part about “run properly”, I recommend that you not have anything important running the first time you launch one of these little rascals. They are not all well behaved. Some may freeze or crash your computer. We have tried to remove all of the really nasty ones, but be advised. About Inits INITs, cdevs, Control Panels, System Extensions — they are all buzz-words for basically the same critters: low-level programs which load automatically when the system starts up. They are the files that you toss into your System Folder. They are used at your own risk in operating systems through OS 9. Do not use them in Classic or OS X. About ppats Ppats are are small graphics used by Mac OS to tile the background of the desktop. 2 About Hypercard Stacks In the mid 80’s Apple introduced a new programming concept known as HyperCard. HyperCard is an application that manipulates files known as stacks. The programming environment was simple enough to encourage many, many Mac users to develop their own stacks. Access to the stacks requires either HyperCard or HyperCard Player. HyperCard allows for authoring. The Player, which is available in the library, does not allow authoring. The Index This section begins a list of all of the files in our library. Clip Art In the good old days, before scanners and digital cameras and vast collections of clip art, there were small collections of clip art. Mostly they were black and white, not color and not grey scale. Some of the art was very good. Our small collection is displayed by thumb nails. Thumb nails are reduced presentations. They were created using a beta version of ThumbsPlus. Fonts Important note: The Mac identifies fonts by an assigned number. Numbers are not necessarily unique. If two fonts have the same number, only one will appear in the font menu. Unless, of course, you are using some sort of a font utility that resolves such conflicts. Another important note: The name of the font suitcase and the name in the font menu are not necessarily the same. Be careful about changing the font menu name, especially if there is an associated Postscript font. I have not been consistent in which name I use in the database. Hopefully this will not be a significant problem. In the beginning, there was the Mac and the Imagewriter. Fonts were bitmaps. The good news was that bitmaps worked reasonably well on the Mac screen and the Imagewriter. A separate font must be created for each font size. The installed font sizes are shown in Outline style in font menus. The Mac uses an algorithm to generate other font sizes, but often the display looks really awful. For optimal display clarity, a second set of characters, twice the point size, should be installed. The inherent limitations of bitmapped fonts, limited font variety, font sizes, and print quality made bitmapped fonts unacceptable to business users. With the introduction of the LaserWriter, a new type of font was created: Postscript or laser or Type 1 fonts. Postscript fonts are scalable, that is, they look pretty good at any point size. Actually a complete font set consists of a bitmapped font and the screen font. The bitmapped font is used for screen display and as a template for the printer font. A separate bitmapped font must be available for each style (italic or bold) to be printed. There may be some subtle differences in the screen font and the printed output. Adobe Type Manager was introduced to augment the standard Mac drivers and produce better looking displays on the screen and on printed output on non-laser devices. It also uses both screen fonts and printer fonts. With the introduction of System 7, Apple introduced a new font technology, TrueType. TrueType fonts combine the elements of bitmapped and printer fonts into a single font set. TrueType fonts may be used with System 6.0.7 if the TrueType extension is installed. 3 The Index File Buddy 8.1.6 1.6 MB 12/2/2004 http://www.skytag.com/filebuddy/ Requires Mac OS X 10.3 or late. We cannot distribute File Buddy from our library. However, it is used to view and edit a wide range of file and folder information, such as modify the names of multiple files at once (for example, remove “.txt” from the names of a group of files), create aliases, find empty files and folders, orphaned files, duplicate files, broken aliases, and unused preference files, create snapshots that can be used to track the changes on a disk, such as files installed by an installer (use snapshots to uninstall applications.) ClipClop 1.1.sea 62 K 8/30/1995 Applications ClipBoard ScrapBk This program allows you to use multiple clipboards with standard applications and allows you to print the clipboard, save it to a text or PICT file, and read a text or PICT file directly into the clipboard. The program also provides an improved, integrated version of the Scrapbook. Museum 0.3.sea 51 K 10/5/1994 Applications ClipBoard ScrapBk A scrapbook for graphics, text, and sound New Scrapbook 2.0 DA 12 K 9/27/1990 Applications ClipBoard ScrapBk Scrap It Pro 5.44.sea 725 K 10/15/1999 Applications ClipBoard ScrapBk http://www.northcoast.com/~jvholder/ScrapItPro5.44.sea.hqx ScrapIt Pro is the editable, searchable multimedia scrapbook and a mini-word processor to boot! Store, sort, display and search all of your text notes, sounds, GIF files, JPEG files, QuickDraw 3D files. The latest version allows creation of forms on the screen. Scrapbook Burster ƒ 10 K 9/11/1999 Applications ClipBoard ScrapBk Scrapbook Burster is a simple utility that copies each picture in a scrapbook file into an individual PICT file. Scrapz 1.3.2 DA.sea 55 K 10/4/1999 Applications ClipBoard ScrapBk Address Book 3.7.0.sea 366 K 5/14/1998 Applications Contact Mgrs Address book is an easy to use, yet fast and powerful way to provide you with complete management and control of lists of names, addresses, and phone numbers Address Notebook 1.1.1.sea 165 K 10/16/1999 Applications Contact Mgrs Address Notebook is a simple, fast and powerful program for saving addresses and notes. Little Black Book DA.sea 100 K 12/16/1998 Applications Contact Mgrs A basic phone book. Phonebook Plus 3.7.sea 405 K 10/16/1999 Applications Contact Mgrs http://www.knotech.com/shareware/PBPlus.html Phonebook Plus is essentially a personal information manager, or PIM. It sports a fast and intuitive “rolodex” interface. It has great dialing features, handles long distance and international calls easily, and supports envelope printing, color coding, and custom reports. The emphasis is on elegance; after all, if your phonebook program doesn’t keep your addresses at your fingertips, what good is it? DOCMaker 4.8.4.sea 367 K 10/16/1999 Applications Doc Makers http://www.hsv.tis.net/~greenmtn/DOCMaker484.hqx DOCMaker is an application for the Macintosh which creates stand-alone, self-running document files.
Recommended publications
  • Guidance for the Provision of ESI to Detainees
    Guidance for the Provision of ESI to Detainees Joint Electronic Technology Working Group October 25, 2016 Contents Guidance ......................................................................................................................................... 1 I. An Approach to Providing e-Discovery to Federal Pretrial Detainees ................................... 1 II. Special Concerns in the Delivery of ESI to Detainees ........................................................... 2 A. Defense Concerns .............................................................................................................. 2 B. CJA and FDO Budgeting Concerns ................................................................................... 3 C. Court Concerns ................................................................................................................... 3 D. Facility Concerns ............................................................................................................... 3 E. U.S. Marshals Service Concerns ........................................................................................ 4 F. Government Concerns ........................................................................................................ 4 III. Practical Steps ....................................................................................................................... 4 A. Government, Defense, Facility and Judicial Points of Contact/Working Group ............... 4 B. Identify Facility e-Discovery Capabilities ........................................................................
    [Show full text]
  • Device Manager 1
    CHAPTER 1 Device Manager 1 This chapter describes how your application can use the Device Manager to transfer information into and out of a Macintosh computer. The Device Manager controls the 1 exchange of information between applications and hardware devices. Manager Device This chapter provides a brief introduction to devices and device drivers (the programs that control devices) and then explains how you can use the Device Manager functions to ■ open, close, and exchange information with device drivers ■ write your own device driver that can communicate with the Device Manager ■ provide a user interface for your device driver by making it a Chooser extension or desk accessory. You should read the sections “About the Device Manager” and “Using the Device Manager” if your application needs to use the Device Manager to communicate with a device driver. Applications often communicate with the Device Manager indirectly, by calling functions of other managers (for example, the File Manager) that use the Device Manager. However, sometimes applications must call Device Manager functions directly. The sections “Writing a Device Driver,” “Writing a Chooser-Compatible Device Driver,” and “Writing a Desk Accessory,” provide information you’ll need if you are writing your own device driver. If you writing a device driver, you should understand how memory is organized and allocated in Macintosh computers. See Inside Macintosh: Memory, for this information. You should also be familiar with resources and how the system searches resource files. You can find this information in the chapter “Resource Manager” in Inside Macintosh: More Macintosh Toolbox. If your device driver is to perform background tasks, you’ll need to understand how processes are scheduled.
    [Show full text]
  • Macworld UK Jul 2001.Pdf
    Macworld G4 UPGRADES TAKE YOUR OLD MAC TO 500MHZ JULY 2001 JULY IBOOK TESTED • LCD DISPLAYS • G4 UPGRADE CARDS OS DISPLAYS IBOOK TESTED • LCD • WORD TIPS • PROJECTORS X APPLICATIONS MORE NEWS, MORE REVIEWS White light Apple’s BEST portable yet? New iBook tested OS X software All new applications Flat-panel displays 26 sexy LCD screens tested ALSO INSIDE: Word tips • Flash 5 guide • Improve your info-graphics • Inside Apple’s new shops • Civilization III • FreeHand 10 • Director 8.5 • Projector roundup read me first Simon Jary Wow! Apple’s actually beaten its editor-in-chief own timetable to get Mac OS X pre-installed on all of its new Macs. About time 2.0 t Macworld, we often see amazing technologies even been seen by the secret services of the high-tech demonstrated to us by fire-eyed developers. warring factions of the planet Kabbula. They say “Wow!”; we say “Wow!”; we write Bungie was the worst offender. First there was Oni… A about it; you say “Wow!”. Not long after you’ve “Wow!”. Then there was Halo… “Double Wow!”. Several shown the article to someone else, and they’ve said years after we all first looked forward to pretending to “Wow!”, you start writing in and asking when Wow 1.0 be lithe Japanese urban-shooter girls, Oni finally will be available to buy. Then we realize that what we shipped for the Mac. It’s now at least a couple of years just saw wasn’t anywhere near ready to ship. This is the since we imagined ourselves as body-armoured Halo point at which Wow turns to Oww… space troopers, and still we wait.
    [Show full text]
  • Chapter 1. Origins of Mac OS X
    1 Chapter 1. Origins of Mac OS X "Most ideas come from previous ideas." Alan Curtis Kay The Mac OS X operating system represents a rather successful coming together of paradigms, ideologies, and technologies that have often resisted each other in the past. A good example is the cordial relationship that exists between the command-line and graphical interfaces in Mac OS X. The system is a result of the trials and tribulations of Apple and NeXT, as well as their user and developer communities. Mac OS X exemplifies how a capable system can result from the direct or indirect efforts of corporations, academic and research communities, the Open Source and Free Software movements, and, of course, individuals. Apple has been around since 1976, and many accounts of its history have been told. If the story of Apple as a company is fascinating, so is the technical history of Apple's operating systems. In this chapter,[1] we will trace the history of Mac OS X, discussing several technologies whose confluence eventually led to the modern-day Apple operating system. [1] This book's accompanying web site (www.osxbook.com) provides a more detailed technical history of all of Apple's operating systems. 1 2 2 1 1.1. Apple's Quest for the[2] Operating System [2] Whereas the word "the" is used here to designate prominence and desirability, it is an interesting coincidence that "THE" was the name of a multiprogramming system described by Edsger W. Dijkstra in a 1968 paper. It was March 1988. The Macintosh had been around for four years.
    [Show full text]
  • Mac OS X: an Introduction for Support Providers
    Mac OS X: An Introduction for Support Providers Course Information Purpose of Course Mac OS X is the next-generation Macintosh operating system, utilizing a highly robust UNIX core with a brand new simplified user experience. It is the first successful attempt to provide a fully-functional graphical user experience in such an implementation without requiring the user to know or understand UNIX. This course is designed to provide a theoretical foundation for support providers seeking to provide user support for Mac OS X. It assumes the student has performed this role for Mac OS 9, and seeks to ground the student in Mac OS X using Mac OS 9 terms and concepts. Author: Robert Dorsett, manager, AppleCare Product Training & Readiness. Module Length: 2 hours Audience: Phone support, Apple Solutions Experts, Service Providers. Prerequisites: Experience supporting Mac OS 9 Course map: Operating Systems 101 Mac OS 9 and Cooperative Multitasking Mac OS X: Pre-emptive Multitasking and Protected Memory. Mac OS X: Symmetric Multiprocessing Components of Mac OS X The Layered Approach Darwin Core Services Graphics Services Application Environments Aqua Useful Mac OS X Jargon Bundles Frameworks Umbrella Frameworks Mac OS X Installation Initialization Options Installation Options Version 1.0 Copyright © 2001 by Apple Computer, Inc. All Rights Reserved. 1 Startup Keys Mac OS X Setup Assistant Mac OS 9 and Classic Standard Directory Names Quick Answers: Where do my __________ go? More Directory Names A Word on Paths Security UNIX and security Multiple user implementation Root Old Stuff in New Terms INITs in Mac OS X Fonts FKEYs Printing from Mac OS X Disk First Aid and Drive Setup Startup Items Mac OS 9 Control Panels and Functionality mapped to Mac OS X New Stuff to Check Out Review Questions Review Answers Further Reading Change history: 3/19/01: Removed comment about UFS volumes not being selectable by Startup Disk.
    [Show full text]
  • Infovox Ivox & Visiovoice
    Cover by Michele Patterson Masthead Publisher Robert L. Pritchett from MPN, LLC Editor-in-Chief Robert L. Pritchett Editor Mike Hubbartt Assistant Editor Harry (doc) Babad Consultant Ted Bade Advertising and Marketing Director Wayne Lefevre Web Master James Meister Public Relations and Merchandizing Mark Howson Contacts Webmaster at macCompanion dot com Feedback at macCompanion dot com Correspondence 1952 Thayer, Drive, Richland, WA 99352 USA 1-509-210-0217 1-888-684-2161 rpritchett at macCompanion dot com The Macintosh Professional Network Team Harry {doc} Babad Ted Bade Matt Brewer (MacFanatic) Jack Campbell (Guest Author) Ken Crockett (Apple News Now) Kale Feelhaver (AppleMacPunk) Dr. Eric Flescher Eddie Hargreaves Jonathan Hoyle III Mark Howson (The Mac Nurse) Mike Hubbartt Daphne Kalfon (I Love My Mac) Wayne Lefevre Daniel MacKenzie Chris Marshall (My Apple Stuff) Dom McAllister Derek Meier James Meister Michele Patterson David Phillips (Guest Author) Robert Pritchett Leland Scott Dennis Sellers (Macsimum News) Gene Steinberg (The Tech Night Owl) Rick Sutcliffe (The Northern Spy) Tim Verpoorten (Surfbits) Julie M. Willingham Application Service Provider for the macCompanion website: http://www.stephousehosting.com Thanks to Daniel Counsell of Realmac Software Development (http://www.realmacsoftware.com), who graced these pages and our website with newer rating stars. Our special thanks to all those who have allowed us to review their products! In addition, thanks to you, our readers, who make this effort possible. Please support
    [Show full text]
  • Adopting the Aqua Interface
    INSIDE MAC OS X Adopting the Aqua Interface Updated for Mac OS X Public Beta Release. 9/8/00 © Apple Computer, Inc. 2000 Apple Computer, Inc. Even though Apple has reviewed this © 2000 Apple Computer, Inc. manual, APPLE MAKES NO All rights reserved. WARRANTY OR REPRESENTATION, EITHER EXPRESS OR IMPLIED, WITH No part of this publication may be RESPECT TO THIS MANUAL, ITS reproduced, stored in a retrieval QUALITY, ACCURACY, system, or transmitted, in any form or MERCHANTABILITY, OR FITNESS by any means, mechanical, electronic, FOR A PARTICULAR PURPOSE. AS A photocopying, recording, or RESULT, THIS MANUAL IS SOLD “AS otherwise, without prior written IS,” AND YOU, THE PURCHASER, ARE permission of Apple Computer, Inc., ASSUMING THE ENTIRE RISK AS TO with the following exceptions: Any ITS QUALITY AND ACCURACY. person is hereby authorized to store documentation on a single computer IN NO EVENT WILL APPLE BE LIABLE for personal use only and to print FOR DIRECT, INDIRECT, SPECIAL, copies of documentation for personal INCIDENTAL, OR CONSEQUENTIAL use provided that the documentation DAMAGES RESULTING FROM ANY contains Apple’s copyright notice. DEFECT OR INACCURACY IN THIS The Apple logo is a trademark of MANUAL, even if advised of the Apple Computer, Inc. possibility of such damages. Use of the “keyboard” Apple logo THE WARRANTY AND REMEDIES SET (Option-Shift-K) for commercial FORTH ABOVE ARE EXCLUSIVE AND purposes without the prior written IN LIEU OF ALL OTHERS, ORAL OR consent of Apple may constitute WRITTEN, EXPRESS OR IMPLIED. No trademark infringement and unfair Apple dealer, agent, or employee is competition in violation of federal authorized to make any modification, and state laws.
    [Show full text]
  • IM: F: Introduction to Files
    CHAPTER 1 Introduction to File Management 1 This chapter is a general introduction to file management on Macintosh computers. It explains the basic structure of Macintosh files and the hierarchical file system (HFS) used 1 with Macintosh computers, and it shows how you can use the services provided by the Introduction to File Management Standard File Package, the File Manager, the Finder, and other system software components to create, open, update, and close files. You should read this chapter if your application implements the commands typically found in an application’s File menu—except for printing commands and the Quit command, which are described elsewhere. This chapter describes how to ■ create a new file ■ open an existing file ■ close a file ■ save a document’s data in a file ■ save a document’s data in a file under a new name ■ revert to the last saved version of a file ■ create and read a preferences file Depending on the requirements of your application, you may be able to accomplish all your file-related operations by following the instructions given in this chapter. If your application has more specialized file management needs, you’ll need to read some or all of the remaining chapters in this book. This chapter assumes that your application is running in an environment in which the routines that accept file system specification records (defined by the FSSpec data type) are available. File system specification records, introduced in system software version 7.0, simplify the identification of objects in the file system. Your development environment may provide “glue” that allows you to call those routines in earlier system software versions.
    [Show full text]
  • Inside Quicktime: Interactive Movies
    Inside QuickTime The QuickTime Technical Reference Library Interactive Movies October 2002 Apple Computer, Inc. Java and all Java-based trademarks © 2001 Apple Computer, Inc. are trademarks of Sun Microsystems, All rights reserved. Inc. in the U.S. and other countries. No part of this publication may be Simultaneously published in the reproduced, stored in a retrieval United States and Canada system, or transmitted, in any form or Even though Apple has reviewed this by any means, mechanical, electronic, manual, APPLE MAKES NO photocopying, recording, or WARRANTY OR REPRESENTATION, otherwise, without prior written EITHER EXPRESS OR IMPLIED, WITH permission of Apple Computer, Inc., RESPECT TO THIS MANUAL, ITS with the following exceptions: Any QUALITY, ACCURACY, person is hereby authorized to store MERCHANTABILITY, OR FITNESS documentation on a single computer FOR A PARTICULAR PURPOSE. AS A for personal use only and to print RESULT, THIS MANUAL IS SOLD “AS copies of documentation for personal IS,” AND YOU, THE PURCHASER, ARE use provided that the documentation ASSUMING THE ENTIRE RISK AS TO contains Apple’s copyright notice. ITS QUALITY AND ACCURACY. The Apple logo is a trademark of IN NO EVENT WILL APPLE BE LIABLE Apple Computer, Inc. FOR DIRECT, INDIRECT, SPECIAL, Use of the “keyboard” Apple logo INCIDENTAL, OR CONSEQUENTIAL (Option-Shift-K) for commercial DAMAGES RESULTING FROM ANY purposes without the prior written DEFECT OR INACCURACY IN THIS consent of Apple may constitute MANUAL, even if advised of the trademark infringement and unfair possibility of such damages. competition in violation of federal and state laws. THE WARRANTY AND REMEDIES SET FORTH ABOVE ARE EXCLUSIVE AND No licenses, express or implied, are IN LIEU OF ALL OTHERS, ORAL OR granted with respect to any of the WRITTEN, EXPRESS OR IMPLIED.
    [Show full text]
  • Symantec Web Security Service Policy Guide
    Web Security Service Policy Guide Revision: NOV.07.2020 Symantec Web Security Service/Page 2 Policy Guide/Page 3 Copyrights Broadcom, the pulse logo, Connecting everything, and Symantec are among the trademarks of Broadcom. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. Copyright © 2020 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. For more information, please visit www.broadcom.com. Broadcom reserves the right to make changes without further notice to any products or data herein to improve reliability, function, or design. Information furnished by Broadcom is believed to be accurate and reliable. However, Broadcom does not assume any liability arising out of the application or use of this information, nor the application or use of any product or circuit described herein, neither does it convey any license under its patent rights nor the rights of others. Policy Guide/Page 4 Symantec WSS Policy Guide The Symantec Web Security Service solutions provide real-time protection against web-borne threats. As a cloud-based product, the Web Security Service leverages Symantec's proven security technology, including the WebPulse™ cloud community. With extensive web application controls and detailed reporting features, IT administrators can use the Web Security Service to create and enforce granular policies that are applied to all covered users, including fixed locations and roaming users. If the WSS is the body, then the policy engine is the brain. While the WSS by default provides malware protection (blocks four categories: Phishing, Proxy Avoidance, Spyware Effects/Privacy Concerns, and Spyware/Malware Sources), the additional policy rules and options you create dictate exactly what content your employees can and cannot access—from global allows/denials to individual users at specific times from specific locations.
    [Show full text]
  • The Apple Ecosystem
    APPENDIX A The Apple Ecosystem There are a lot of applications used to manage Apple devices in one way or another. Additionally, here’s a list of tools, sorted alphabetically per category in order to remain vendor agnostic. Antivirus Solutions for scanning Macs for viruses and other malware. • AVG: Basic antivirus and spyware detection and remediation. • Avast: Centralized antivirus with a cloud console for tracking incidents and device status. • Avira: Antivirus and a browser extension. Avira Connect allows you to view device status online. • BitDefender: Antivirus and malware managed from a central console. • CarbonBlack: Antivirus and Application Control. • Cylance: Ransomware, advanced threats, fileless malware, and malicious documents in addition to standard antivirus. • Kaspersky: Antivirus with a centralized cloud dashboard to track device status. © Charles Edge and Rich Trouton 2020 707 C. Edge and R. Trouton, Apple Device Management, https://doi.org/10.1007/978-1-4842-5388-5 APPENDIX A THe AppLe ECOSYSteM • Malware Bytes: Antivirus and malware managed from a central console. • McAfee Endpoint Security: Antivirus and advanced threat management with a centralized server to track devices. • Sophos: Antivirus and malware managed from a central console. • Symantec Mobile Device Management: Antivirus and malware managed from a central console. • Trend Micro Endpoint Security: Application whitelisting, antivirus, and ransomware protection in a centralized console. • Wandera: Malicious hot-spot monitoring, jailbreak detection, web gateway for mobile threat detection that integrates with common MDM solutions. Automation Tools Scripty tools used to automate management on the Mac • AutoCasperNBI: Automates the creation of NetBoot Images (read: NBI’s) for use with Casper Imaging. • AutoDMG: Takes a macOS installer (10.10 or newer) and builds a system image suitable for deployment with Imagr, DeployStudio, LANrev, Jamf Pro, and other asr or Apple Systems Restore-based imaging tools.
    [Show full text]
  • SYSTEM SOFTWARE, MEMORY, and RESOURCES Includes Demonstration Program Sysmemres
    1 SYSTEM SOFTWARE, MEMORY, AND RESOURCES Includes Demonstration Program SysMemRes Macintosh System Software All Macintosh applications make many calls, for many purposes, to Macintosh system software functions. Such purposes include, for example, the creation of standard user interface elements such as windows and menus, the drawing of text and graphics, and the coordination of the application's actions with other open applications.1 The majority of system software functions are components of either the Macintosh Toolbox or the Macintosh Operating System. In essence: • Toolbox functions have to do with mediating your application with the user. They relate, in general, to the management of elements of the user interface. • Operating System functions have to do with mediating your application with the Macintosh hardware, performing such basic low-level tasks as file input and output, memory management and process and device control. Managers The entire collection of system software functions is further divided into functional groups which are usually known as managers.2 Toolbox The main Toolbox managers are as follows: QUICKDRAW WINDOW MANAGER DIALOG MANAGER CONTROL MANAGER MENU MANAGER TEXTEDIT EVENT MANAGER RESOURCE HELP MANAGER SCRAP MANAGER FINDER INTERFACE LIST MANAGER MANAGER SOUND MANAGER SOUND INPUT STANDARD FILE NAVIGATION APPEARANCE FOLDER MANAGER PACKAGE SERVICES MANAGER MANAGER Introduced with Mac OS 8.0. Note that Navigation Services renders Standard File Package obsolescent 1 The main other open application that an application needs to work with is the Finder, which is responsible for keeping track of files and managing the user’s desktop. The Finder is not really part of the system software, although it is sometimes difficult to tell where the Finder ends and the system software begins.
    [Show full text]