Macintosh OS X Boot Process and Forensic Software

Total Page:16

File Type:pdf, Size:1020Kb

Macintosh OS X Boot Process and Forensic Software Chapter 1 Macintosh OS X Boot Process and Forensic Software Solutions in this chapter: ■ The Boot Process ■ The Macintosh Boot Process ■ Macintosh Forensic Software ˛ Summary 1 00000779308.INDD000779308.INDD 1 44/4/2008/4/2008 112:53:592:53:59 PPMM 2 Chapter 1 • Macintosh OS X Boot Process and Forensic Software Introduction “The computer for the rest of us” was never considered much of a hacker’s platform. The original Mac didn’t even have arrow keys (or a control key, for that matter), forcing the user to stop what he was doing, take his hands off the keyboard, and use the mouse. The Mac’s case was sealed so tight, a special tool known as the “Mac cracker” was made to break it open. It was a closed machine, an information appliance. The expansionless design and sealed case of the Mac stood in stark contrast to the Apple II that came before it. With its rich graphical interface and ease of use, the Mac became the standard for graphic artists and other creative types. Custom icons and desktop patterns soon abounded. The users that embraced the Macintosh for its simplicity began using ResEdit (Resource Editor) to modify system fi les and to personalize their machines. The Mac developed a fanatical following, and you could rest assured that each fanatic’s system was unique, with the icons, menus, program launchers, windows, sounds, and keyboard shortcuts all scrutinized and perfected to meet his personal needs. My Color Classic even played Porky Pig’s “That’s all folks” each time it shut down (although the novelty wore off on that one pretty quick…). Mac OS X was met with some trepidation. It broke every program and system modifi cation, it didn’t have a proper Apple menu — and what on earth was this “dock”? Jef Raskin, who gave the Mac its name, wrote of Mac OS X, “Apple has ignored for years all that has been learned about developing UIs. It’s unprofessional, incompetent, and it’s hurting users.” Bruce Tognazzini, founder of the Apple Human Interface Group, even penned an article titled “Top 10 Reasons the Apple Dock Sucks.” Mac OS X was an entirely different operating system. Most classic Mac OS appli- cations were compatible, but only when operating inside a special run-time environ- ment. All system extensions and user interface modifi cations were permanently lost. For many users, these changes are what made the computer “theirs” and they replied heavily upon their customizations to effi ciently get work done. The loss was tremen- dous. And it was worth it. Preemptive multitasking, symmetric multiprocessing, multithreading, and protected memory... Protected memory was the one I wanted most. At a 1998 keynote, Steve Jobs showed off a mere dialog box, to great applause. The dialog read: “The application Bomb has unexpectedly quit. You do not need to restart your computer.” I take it for granted on Mac OS X, but as I write this, I’m recalling occasions when Internet Explorer brought my entire system down multiple times in a single day. www.syngress.com 00000779308.INDD000779308.INDD 2 44/4/2008/4/2008 112:54:002:54:00 PPMM Macintosh OS X Boot Process and Forensic Software • Chapter 1 3 Protected memory doesn’t do much good when all your apps are running in the Classic Environment and the user interface did indeed leave a lot to be desired. But with each revision, Mac OS X has improved dramatically. The Macintosh has become “the computer for everybody.” For novices, it remains the easiest computer there is. For enthusiasts, as in the old days, there is a vast array of third party applications, utilities, and customizations, to tweak and improve the way the OS works. For hackers and programmers, there’s the command line and the BSD Unix compatibility layer. All the power, all the tools, and all the geekery of Linux is present in Mac OS X. Shell scripts, X11 apps, processes, kernel extensions… it’s a UNIX platform. It’s even possible to forgo Apple’s GUI altogether and run KDE. Why you’d want to is another matter. While its UNIX core is what has made Mac OS X a viable platform for hackers and programmers, it’s the user interface that has made it popular. Apple’s Terminal application is perpetually running on my PowerBook, but so is iTunes, iCal, and a slew of Dashboard Widgets. The Boot Process In this section we will look at the startup process that most computers go through and how the fundamental operating systems get loaded and started. You will see that computers start with tiny steps that build on each other, getting larger until the entire system is loaded and running. Only then can you, the end user, issue commands that the computer interprets and understands. One of the most popular analogies for how a computer starts up is the amnesia scenario. For a moment look around you at the things you use everyday: telephones, pencils, coffee cups, and so on. Now imagine that you closed your eyes and when you opened them you didn’t recognize any of those things, and didn’t know how they worked. That is what happens inside a computer when you press the reset or the power button. At the most fundamental level, computers understand only two things: true and false. The process of getting the computer from being a completely blank state to a fully running operating system is one of the fundamental items that every investigator should understand. After looking at how a Macintosh boots, we will look at some of the tools that are available for analyzing Macintosh systems using both the Macintosh and Windows operating systems. The term “boot,” depending on whom you talk to, came either from the old phrase, “Pulling one’s self up by the bootstraps,” or just from the word “bootstrap,” www.syngress.com 00000779308.INDD000779308.INDD 3 44/4/2008/4/2008 112:54:002:54:00 PPMM 4 Chapter 1 • Macintosh OS X Boot Process and Forensic Software meaning the leather tabs you use to pull on your boots. Either way it is a part of computer history and lore and is commonly used as the computer term for the initial startup of the system. All systems that are able to run Microsoft or Linux operating systems use the same boot up process. Once the computer completes this initial startup the specifi c operating system will load what it needs to continue. First we will look at the boot process in detail. The Macintosh Boot Process In this section, we will briefl y examine the way an Apple Macintosh computer boots. The information here is for the Mac OS X version of their operating system using Intel based microprocessors. Older Motorola chipset Macintosh computers use a much different boot process. OS X uses Open Firmware that is very much like the BIOS noted earlier. The Open Firmware that Apple uses in the Macintosh is based on the IEEE-1275 standard. EFI and BIOS: Similar but Different Just like any other computer on the market, when the power switch is activated on a Macintosh, the system goes through a Power On Self Test (POST), resets the micro- processor, and starts the execution of initialization code, which is the Open Firmware instead of BIOS. Like the BIOS, Extensible Firmware Interface (EFI) checks the confi guration of the machine and loads any device ROMs that it fi nds into memory. It then looks for a default boot device… and here is where it gets interesting. There are numerous optional startup functions that EFI can perform based on user input. Single keys, known as “snag keys,” can be pressed that will allow the system to boot from specifi c devices. ■ Pressing the C key will attempt to boot from the CD/DVD-ROM drive. ■ Pressing the D key will attempt to boot from the fi rst hard disk drive. ■ Pressing the N key will attempt to boot from the Network Interface Controller (NIC). ■ Pressing the Z key will attempt to boot from the ZIP drive. www.syngress.com 00000779308.INDD000779308.INDD 4 44/4/2008/4/2008 112:54:002:54:00 PPMM Macintosh OS X Boot Process and Forensic Software • Chapter 1 5 It is also possible to enter the EFI interactive console mode by pressing the cmd-opt-O-F key combination during power up. (Note: If you are like me and just tried this before reading on, typing mac-boot at the prompt will let the Macintosh fi nish booting.) You should read a good source of Open Firmware/EFI commands before trying the console mode. An excellent mirror of the Open Firmware Working Group is at http://bananjr6000.apple.com/1275/ . The EFI program is located in the BOOT.efi fi le. This is the portion of the boot loading process that loads the OSX kernel and starts the user interface. DARWIN To many die-hard Macintosh users the move to OS X wasn’t immediately seen as a move to the open source UNIX environment. It wasn’t long before they realized their beloved Mac was now a UNIX machine. When you look at the roots of OS X, a large number of open source modules and programs were obtained from other groups includ- ing Carnegie Mellon, FreeBSD, GNU, Mach, Xfree86, NEXTSTEP, and OPENSTEP. The OS X Kernel In a nutshell the real OS X is when the combination of several components come together. XNU is the actual OS X kernel name on the boot drive.
Recommended publications
  • USB-C Dock User Guide
    USB-C Dock User Guide Workflow Notebook and Windows, Mac Device Charging and Chrome CONTENTS Introduction 1.1 Minimum System Requirements .............................................. 1 1.2 Package Contents ..................................................................... 2 1.3 About This Manual .................................................................... 2 1.4 OWC Dock Ejector ..................................................................... 2 1.5 Front View .................................................................................. 3 1.6 Rear View ................................................................................... 3 Support Resources 2.1 Connection ................................................................................ 4 2.2 Usage Notes .............................................................................. 4 2.3 Troubleshooting ........................................................................ 5 2.4 Contacting Techincal Support .................................................. 5 OWC USB-C Dock Contents INTRODUCTION 1.1 Minimum System Requirements Hardware Requirement - 2016–2017 MacBook or - 2016 or later MacBook Pro or - 2018 or later MacBook Air - PC with a USB-C port - Additional Compatibility1 - 2019 Mac Pro - 2019 iMacs - 2017 iMacs including iMac Pro - 2018 Mac mini Operating System - Mac OS X: 10.10–10.11.6 - macOS: 10.12 or later - PC with a USB-C port NOTES - NOTICE! Mac hosts require an Ethernet driver. It can be found here: - www.owcdigital.com/support/software-drivers.html
    [Show full text]
  • File Naming Recommendations
    File Naming Recommendations In a mixed platform world of Macintosh, Windows, and Unix computers, you must pay attention to how you name your file. On PCs, you usually append a three-letter file extension after the file name to tell the computer what program to launch when it is double-clicked. Programs on the PC do this automatically, but the same programs running on the Mac often do not. Things to avoid: 1.) Don't add extraneous punctuation to the file name. For example, don't use #. %, forward or back slashes, ampersands, and question marks or any other strange glyph. Stick mostly to letters and numbers. Dashes and underscores are OK. Good: my_file.jpg Bad: my/file.jpg 2.) Don't put more than one period in the file name. Use only one period at the end of the file name just before the three-letter suffix. Good: very_big_splash.jpg Bad: very.big.splash.jpg 3.) Don't omit the 3-letter suffix. Add the correct 3-letter suffix to the file name if none is created by the application program. ALL web browsers require a suffix to be able to tell a picture file from a text file, for example. Good: promopic.gif Bad: promopic.newone Bad: promopic 4.) Avoid spaces in filenames. High-speed Unix-based web servers dislike having spaces in the file name. Your pages and files with spaces in the name may work on a Mac or PC server, but if you ever migrate the files to a Unix server, you're in trouble. Most web designers use underscores in the file name to separate words for clarity.
    [Show full text]
  • Building a SAN-Less Private Cloud with IBM Powervm and IBM Powervc
    Front cover Building a SAN-less Private Cloud with IBM PowerVM and IBM PowerVC Javier Bazan Lazcano Stephen Lutz Redpaper International Technical Support Organization Building a SAN-less Private Cloud with IBM PowerVM and IBM PowerVC July 2018 REDP-5455-02 Note: Before using this information and the product it supports, read the information in “Notices” on page v. Third Edition (July 2018) This edition applies to Version 1, Release 4, Modification 1 of IBM Cloud PowerVC Manager for Software-Defined Infrastructure V1.1 (product number 5765-VCD). © Copyright International Business Machines Corporation 2017, 2018. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . .v Trademarks . vi Preface . vii Authors. vii Now you can become a published author, too! . viii Comments welcome. viii Stay connected to IBM Redbooks . viii Chapter 1. Architecture of a software-defined infrastructure solution with IBM Power Systems servers and IBM PowerVC . 1 1.1 Software-defined infrastructure . 2 1.2 The motivation behind software-defined infrastructure . 2 1.3 Use cases . 4 1.3.1 Use case 1: Building a storage area network-less cloud . 4 1.3.2 Use case 2: Building an iSCSI-backed cloud . 5 1.3.3 More use cases. 5 1.4 Rack topologies and components . 6 1.4.1 Starter cloud . 7 1.4.2 Mini cloud . 8 1.4.3 Rack scale . 9 1.4.4 Storage/management switches. 10 1.4.5 Data switches . 10 1.4.6 Network nodes .
    [Show full text]
  • Mac OS X Server Administrator's Guide
    034-9285.S4AdminPDF 6/27/02 2:07 PM Page 1 Mac OS X Server Administrator’s Guide K Apple Computer, Inc. © 2002 Apple Computer, Inc. All rights reserved. Under the copyright laws, this publication may not be copied, in whole or in part, without the written consent of Apple. The Apple logo is a trademark of Apple Computer, Inc., registered in the U.S. and other countries. Use of the “keyboard” Apple logo (Option-Shift-K) for commercial purposes without the prior written consent of Apple may constitute trademark infringement and unfair competition in violation of federal and state laws. Apple, the Apple logo, AppleScript, AppleShare, AppleTalk, ColorSync, FireWire, Keychain, Mac, Macintosh, Power Macintosh, QuickTime, Sherlock, and WebObjects are trademarks of Apple Computer, Inc., registered in the U.S. and other countries. AirPort, Extensions Manager, Finder, iMac, and Power Mac are trademarks of Apple Computer, Inc. Adobe and PostScript are trademarks of Adobe Systems Incorporated. Java and all Java-based trademarks and logos are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. and other countries. Netscape Navigator is a trademark of Netscape Communications Corporation. RealAudio is a trademark of Progressive Networks, Inc. © 1995–2001 The Apache Group. All rights reserved. UNIX is a registered trademark in the United States and other countries, licensed exclusively through X/Open Company, Ltd. 062-9285/7-26-02 LL9285.Book Page 3 Tuesday, June 25, 2002 3:59 PM Contents Preface How to Use This Guide 39 What’s Included
    [Show full text]
  • 10 Podcast Automation Hacks Rev7
    TOP 10 RESOURCES TO BOOST YOUR PODCASTING PRODUCTIVITY HANI MOURRA Generate Leads & Grow your Audience on Autopilot with Simple Podcast Press Table of Contents Note from the Author 3 Section 1 - Podcast Preparation Tools 4 Section 2 - Content Creation Hacks 10 Section 3 - Content Publishing Hacks 19 Conclusion 29 Click Here To Share on Facebook !2 of !29 Click Here to Share on Twitter Generate Leads & Grow your Audience on Autopilot with Simple Podcast Press Note from the Author Hey there. Hani Mourra here from Simple Podcast Press, a Wordpress plugin that automates the publishing of podcasts to your website and helps you generate leads and grow your audience on autopilot. This plugin is being used and recommended by top podcast coaches including John Lee Dumas of Entrepreneur on Fire (get on his free value-packed webinars on podcasting) and Dave Jackson of The School of Podcasting. I’ve helped produce over a hundred episodes for many different podcasts including Sean Malarkey’s The Money Pillow and Kris Gilbertson’s The Lifestyle Entrepreneur and I’ve learned a lot of tips and tricks to speed up and simplify the podcast production and publishing process, which I share with you in this guide. So without further ado, let’s jump right into learning some cool productivity hacks. Let’s do it! Click Here To Share on Facebook !3 of !29 Click Here to Share on Twitter Generate Leads & Grow your Audience on Autopilot with Simple Podcast Press Section 1 - Podcast Preparation Tools 1. Podcast Artwork - Having a clean and attractive podcast channel artwork will help draw attention to your podcast on iTunes.
    [Show full text]
  • Mac OS X: an Introduction for Support Providers
    Mac OS X: An Introduction for Support Providers Course Information Purpose of Course Mac OS X is the next-generation Macintosh operating system, utilizing a highly robust UNIX core with a brand new simplified user experience. It is the first successful attempt to provide a fully-functional graphical user experience in such an implementation without requiring the user to know or understand UNIX. This course is designed to provide a theoretical foundation for support providers seeking to provide user support for Mac OS X. It assumes the student has performed this role for Mac OS 9, and seeks to ground the student in Mac OS X using Mac OS 9 terms and concepts. Author: Robert Dorsett, manager, AppleCare Product Training & Readiness. Module Length: 2 hours Audience: Phone support, Apple Solutions Experts, Service Providers. Prerequisites: Experience supporting Mac OS 9 Course map: Operating Systems 101 Mac OS 9 and Cooperative Multitasking Mac OS X: Pre-emptive Multitasking and Protected Memory. Mac OS X: Symmetric Multiprocessing Components of Mac OS X The Layered Approach Darwin Core Services Graphics Services Application Environments Aqua Useful Mac OS X Jargon Bundles Frameworks Umbrella Frameworks Mac OS X Installation Initialization Options Installation Options Version 1.0 Copyright © 2001 by Apple Computer, Inc. All Rights Reserved. 1 Startup Keys Mac OS X Setup Assistant Mac OS 9 and Classic Standard Directory Names Quick Answers: Where do my __________ go? More Directory Names A Word on Paths Security UNIX and security Multiple user implementation Root Old Stuff in New Terms INITs in Mac OS X Fonts FKEYs Printing from Mac OS X Disk First Aid and Drive Setup Startup Items Mac OS 9 Control Panels and Functionality mapped to Mac OS X New Stuff to Check Out Review Questions Review Answers Further Reading Change history: 3/19/01: Removed comment about UFS volumes not being selectable by Startup Disk.
    [Show full text]
  • EASY OS X® MAVERICKS Editor-In-Chief Copyright © 2014 by Pearson Education, Inc
    CHAPTER 1 Getting Started ......................................................................... Pg. 2 CHAPTER 2 Working with Disks, Folders, and Files ............................... Pg. 28 CHAPTER 3 Installing and Using Applications ........................................ Pg. 56 CHAPTER 4 Setting System Preferences ................................................. Pg. 76 CHAPTER 5 ® OS X Customizing Your Mac ..........................................................Pg. 90 Mavericks CHAPTER 6 Organizing Your Life ............................................................ Pg. 108 CHAPTER 7 Kate Binder Printing, Faxing, and Scanning ............................................Pg. 134 CHAPTER 8 Keeping in Touch ...................................................................Pg. 146 CHAPTER 9 Living Online .......................................................................... Pg. 172 CHAPTER 10 Getting an iLife ......................................................................Pg. 198 CHAPTER 11 Sharing Your Mac with Multiple Users .............................Pg. 230 CHAPTER 12 Creating a Home Network ................................................. Pg. 242 CHAPTER 13 Maintaining Your Mac .......................................................... Pg. 258 800 East 96th Street Glossary ..................................................................................Pg. 274 Indianapolis, In 46240 Index ....................................................................................... Pg. 282 ii CONTENTS CHAPTER 1 GETTING
    [Show full text]
  • Mac OS for Quicktime Programmers
    Mac OS For QuickTime Programmers Apple Computer, Inc. Technical Publications April, 1998 Apple Computer, Inc. Apple, the Apple logo, Mac, LIMITED WARRANTY ON MEDIA © 1998 Apple Computer, Inc. Macintosh, QuickDraw, and AND REPLACEMENT All rights reserved. QuickTime are trademarks of Apple ALL IMPLIED WARRANTIES ON THIS No part of this publication or the Computer, Inc., registered in the MANUAL, INCLUDING IMPLIED software described in it may be United States and other countries. WARRANTIES OF reproduced, stored in a retrieval The QuickTime logo is a trademark MERCHANTABILITY AND FITNESS system, or transmitted, in any form of Apple Computer, Inc. FOR A PARTICULAR PURPOSE, ARE or by any means, mechanical, Adobe, Acrobat, Photoshop, and LIMITED IN DURATION TO NINETY electronic, photocopying, recording, PostScript are trademarks of Adobe (90) DAYS FROM THE DATE OF or otherwise, without prior written Systems Incorporated or its DISTRIBUTION OF THIS PRODUCT. permission of Apple Computer, Inc., subsidiaries and may be registered in Even though Apple has reviewed this except in the normal use of the certain jurisdictions. manual, APPLE MAKES NO software or to make a backup copy Helvetica and Palatino are registered WARRANTY OR REPRESENTATION, of the software or documentation. trademarks of Linotype-Hell AG EITHER EXPRESS OR IMPLIED, WITH The same proprietary and copyright and/or its subsidiaries. RESPECT TO THIS MANUAL, ITS notices must be affixed to any ITC Zapf Dingbats is a registered QUALITY, ACCURACY, permitted copies as were affixed to trademark of International Typeface MERCHANTABILITY, OR FITNESS the original. This exception does not Corporation. FOR A PARTICULAR PURPOSE. AS A allow copies to be made for others, RESULT, THIS MANUAL IS Simultaneously published in the whether or not sold, but all of the DISTRIBUTED “AS IS,” AND YOU United States and Canada.
    [Show full text]
  • Building an Openstep Application by Michael Rutman, Independent Consultant
    Building an OpenStep Application by Michael Rutman, independent consultant Is it really as easy to program in OpenStep OpenStep and NEXTSTEP In 1985, Steve Jobs left Apple and formed NeXT. He found the latest technologies and brought together a team of developers to turn the newest theories into realities. To verify the new technologies, during development Steve would often stop development and have the entire team use the system they were creating. Several existing apps were created during these day or week long kitchens. More importantly, each developer knew how the framework would be used. If developers had a hard time using an object during a kitchen, they knew they had to rework that object. The system they created was called NEXTSTEP. NEXTSTEP has several layers, and each layer was state of the art in 1985. In the 12 years since Steve picked these technologies, the state of the art may have moved, but not advanced. The underlying OS is a Mach mini-kernel running a unix emulator. For practical purposes, Mach is a flavor of BSD unix. However, the Mach mini-kernel offers programmers a rich set of functionality beyond what unix provides. Most of the functionality of Mach is wrapped into the NEXTSTEP framework, so programmers get the power and flexibility of Mach with the ease of use of NEXTSTEP. Sitting on top of Mach is Display Postscript. Postscript, the language of printers, is a nice graphics language. NeXT and Adobe optimized Postscript for displaying on the screen and produced a speedy and powerful display system. NeXT's framework hides most of the Postscript, but if a programmer wants to get into the guts, there are hooks, called pswraps, to work at the Postscript level.
    [Show full text]
  • Carbon Copy Cloner Documentation: English
    Carbon Copy Cloner Documentation: English Getting started with CCC System Requirements, Installing, Updating, and Uninstalling CCC CCC License, Registration, and Trial FAQs Trouble Applying Your Registration Information? Establishing an initial backup Preparing your backup disk for a backup of Mac OS X Restoring data from your backup What's new in CCC Features of CCC specific to Lion and greater Release History Carbon Copy Cloner's Transition to a Commercial Product: Frequently Asked Questions Credits Example backup scenarios I want to clone my entire hard drive to a new hard drive or a new machine I want to backup my important data to another Macintosh on my network I want to backup multiple machines or hard drives to the same hard drive I want my backup task to run automatically on a scheduled basis Backing up to/from network volumes and other non-HFS volumes I want to back up my whole Mac to a Time Capsule or other network volume I want to defragment my hard drive Backup and archiving settings Excluding files and folders from a backup task Protecting data that is already on your destination volume Managing previous versions of your files Automated maintenance of CCC archives Advanced Settings Some files and folders are automatically excluded from a backup task The Block-Level Copy Scheduling Backup Tasks Scheduling a task and basic settings Performing actions Before and After the backup task Deferring and skipping scheduled tasks Frequently asked questions about scheduled tasks Email and Growl notifications Backing Up to Disk Images
    [Show full text]
  • The Identification and Division of Steve Jobs
    AN ABSTRACT OF THE THESIS OF Scott M. Anderson for the degree of Master of Arts in Interdisciplinary Studies in Speech Communication, Speech Communication, and English presented on May 17, 2012. Title: The Identification and Division of Steve Jobs Abstract approved: Mark P. Moore On April 1, 1976, Steve Jobs and Steve Wozniak entered into a partnership agreement to found Apple Computer. In the decade that followed, Apple experienced remarkable growth and success, as Jobs catapulted Apple to the Fortune 500 list of top‐flight companies faster than any other company in history. Under direction of Jobs, Apple, an idea that started in a garage, transformed into a major force in the computer industry of the 1980s. Though Jobs’ leadership undoubtedly influenced Apple’s success during this time, in 1995, he was forced to resign, when conflicts mounted at the executive level. Using Kenneth Burke’s theory of identification and the dramatistic process, this thesis examines Jobs’ discourse through a series of interviews and textual artifacts. First, I provide a framework for Jobs’ acceptance and rejection of the social order at Apple, and then consider the ways in which Jobs identified with employee and consumer audiences on the basis of division. Analysis shows that Jobs identified with individual empowerment, but valued separation and exclusivity. Jobs’ preference to create identification through division, therefore, established the foundation for new identifications to emerge. The findings of this study suggest that division has significant implications for creating unity. ©Copyright by Scott M. Anderson May 17, 2012 All Rights Reserved The Identification and Division of Steve Jobs by Scott M.
    [Show full text]
  • Stopping INIT Icons Version 002
    Technical Notes PPBD-JHEF002, 4/22/96 Stopping INIT Icons version 002 Please send questions and comments via e-mail to [email protected]. Ó 1996, Apple Computer, Inc. All rights reserved. Apple, Macintosh, and Pippin are trademarks of Apple Computer, Inc. All other brand or product names are trademarks or registered trademarks of their respective companies or organizations. Every effort has been made to ensure the accuracy of information in this document. However, Apple assumes no responsibility for the accuracy of the information. Product information is subject to change without notice. Mention of non-Apple products is for informational purposes only, and consti- tutes neither an endorsement nor a recommendation. Apple assumes no responsibility with regard to the selection, performance or use of these products. All understandings, agreements, or warranties, if any, take place directly between the vendors and the prospective users. Technical Notes PPBD-JHEF002, 4/22/96 The Pippin OS frequently includes extensions such as QuickTime and Applejack. Extensions almost always draw an icon when loading, which is what produces the row of icons across the bottom of the screen when the system is booting. The Pippin user experience though should not include such computer specific messages. The user probably will not even know what QuickTime is. Therefore, developers should stop the drawing of icons during the boot process for Pippin CDs. Stopping an icon from drawing on the screen at boot time is relatively easy. Just erase its mask with ResEdit and QuickDraw won’t draw it. This procedure shows how to prevent QuickTime from drawing its icon but the process is the same for all extensions.
    [Show full text]