Tinkertool System 7 Reference Manual Ii

Total Page:16

File Type:pdf, Size:1020Kb

Tinkertool System 7 Reference Manual Ii Documentation 0642-1075/2 TinkerTool System 7 Reference Manual ii Version 7.5, August 24, 2021. US-English edition. MBS Documentation 0642-1075/2 © Copyright 2003 – 2021 by Marcel Bresink Software-Systeme Marcel Bresink Software-Systeme Ringstr. 21 56630 Kretz Germany All rights reserved. No part of this publication may be redistributed, translated in other languages, or transmitted, in any form or by any means, electronic, mechanical, recording, or otherwise, without the prior written permission of the publisher. This publication may contain examples of data used in daily business operations. To illustrate them as completely as possible, the examples include the names of individuals, companies, brands, and products. All of these names are fictitious and any similarity to the names and addresses used by an actual business enterprise is entirely coincidental. This publication could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. The publisher may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice. Make sure that you are using the correct edition of the publication for the level of the product. The version number can be found at the top of this page. Apple, macOS, iCloud, and FireWire are registered trademarks of Apple Inc. Intel is a registered trademark of Intel Corporation. UNIX is a registered trademark of The Open Group. Broadcom is a registered trademark of Broadcom, Inc. Amazon Web Services is a registered trademark of Amazon.com, Inc. Google Cloud Storage is a registered trade- mark of Google LLC. Microsoft Azure is a registered trademark of the Microsoft group of companies. Trademarks or service marks are used for identification purposes only. This product includes artwork from Corel Corporation which is protected by the copy- right laws of the US, Canada and elsewhere. Used under license. Special thanks go to Mark Weisz for suggestions for improving the US English transla- tion of parts of the manual. Main text typeset with Fontin Sans, a font by Jos Buivenga (exljbris Font Foundry). Contents 1 Introduction 1 1.1 What is TinkerTool System 7? . 1 1.1.1 About the different functional areas of TinkerTool System 7 . 2 1.1.2 System Requirements . 3 1.2 The Security Policy of TinkerTool System . 3 1.2.1 Confirming a privileged operation . 4 1.2.2 Technical Details for Advanced Users . 7 1.2.3 Removing outdated generations of the security component . 7 1.3 Basic Operations . 8 1.3.1 The control window of TinkerTool System . 8 1.3.2 Searching for features by keywords . 10 1.3.3 Using the Touch Bar . 10 1.3.4 Context Help . 11 1.3.5 The Dock Menu . 11 1.3.6 Fields for file system objects . 11 1.3.7 Understanding when Changes Take Effect . 12 1.3.8 General Preferences . 12 1.3.9 Reverting All Permanent Changes to System Settings . 16 1.3.10 Searching for Software Updates . 17 1.4 System Integrity Protection . 17 1.4.1 Technical Background . 17 1.4.2 Disabling Protection . 18 1.5 Privacy Policy Settings of your Mac . 19 1.5.1 Background Information . 19 1.5.2 Privacy Settings affecting TinkerTool System . 20 1.5.3 Changing the privacy settings . 20 1.6 Integrating TinkerTool into TinkerTool System 7 . 21 1.6.1 Enabling Integration . 21 1.6.2 Disabling integration . 22 2 System Maintenance 23 2.1 The Pane Maintenance . 23 2.1.1 Clear Directory Cache . 23 2.1.2 Locate Database . 24 iii iv CONTENTS 2.1.3 Shared User Folder . 25 2.2 The Pane Caches . 26 2.2.1 Introduction to caching . 26 2.2.2 Unprotected and Protected Caches . 27 2.2.3 Using the Cache Maintenance Functions . 28 2.2.4 Font Caches . 29 2.2.5 Icon Caches . 31 2.2.6 Kernel Driver Staging . 32 2.3 The Pane Time Machine X . 34 2.3.1 Time Machine Basics . 34 2.3.2 General Notes when Working with the Time Machine Pane . 34 2.3.3 The different versions of Time Machine for macOS 10 and macOS 11 34 2.3.4 Maintenance After Replacing a Data Source of Time Machine . 35 2.3.5 Backup Verification and Statistics . 38 2.3.6 Comparing Time Machine backup snapshots . 41 2.3.7 Working with Local Snapshots . 44 2.3.8 Deleting Time Machine Backup Data . 46 2.3.9 Retrieving Time Machine Logs . 49 2.4 The Pane Time Machine . 49 2.4.1 Maintenance After Replacing a Data Source of Time Machine (macOS 11 mode) . 51 2.4.2 Backup Verification . 54 2.4.3 Comparing Time Machine backup snapshots (macOS 11 mode) . 54 2.4.4 Working with Local Snapshots (macOS 11 mode) . 58 2.4.5 Deleting Time Machine snapshots . 60 2.5 The Pane Issues . 62 2.5.1 Resolving Issues with the macOS Software Update Feature . 62 2.5.2 App Store Update . 64 2.5.3 Xcode Keychains . 65 2.5.4 Network UI . 65 2.5.5 Erasing the Partitioning Info of Disks to Resolve Issues with Disk Utility . 67 2.6 The Pane Diagnostics . 70 2.6.1 Evaluate RAM Size . 70 2.6.2 Test Finder Copy . 75 2.6.3 Inspecting Optical Disks . 78 2.6.4 SSDs . 80 2.6.5 Flash Health . 82 2.6.6 Performing a Quick Test on Cooling Fans . 86 2.6.7 Login Time Accounting . 88 2.6.8 Testing Displays . 89 2.7 The Pane Emergency Tool . 92 2.7.1 Introduction to the Emergency Tool . 92 2.7.2 Printing the Instructions . 92 2.7.3 Instructions to Launch the Emergency Tool . 92 2.7.4 Using the Emergency Tool . 95 CONTENTS v 2.7.5 Old Versions of the Emergency Tool . 95 2.8 The Pane Network . 96 2.8.1 Information About Network Interfaces . 96 2.8.2 Routing Tables and Network Statistics . 97 2.8.3 Checking Network Connections via Echo Signals . 99 2.8.4 Determine the Assignment Between Host Names and Addresses . 100 2.8.5 Trace the Path of Data Packets . 100 2.8.6 Querying Databases of the Whois Service . 101 2.8.7 Determining User Information via the Finger Service . 102 2.8.8 Scan for Open IPv4 Ports . 103 2.9 The Pane Info . 105 2.9.1 System Information . 105 2.9.2 Malware Protection . 110 2.9.3 App Deny List . 112 2.9.4 Classic Logs and Reports . 114 2.9.5 Modern Logging and Tracing . 118 3 File Operations 125 3.1 The Pane Files . 125 3.1.1 Link . 125 3.1.2 Protection . 127 3.1.3 Attributes . 128 3.1.4 Quarantine . 130 3.1.5 Contents . 131 3.1.6 Force Delete . 133 3.1.7 Nesting . 134 3.1.8 Extended Attributes . 137 3.2 The Pane Clean Up . 140 3.2.1 General Policy when Deleting Files . 140 3.2.2 Hidden Support Files . 140 3.2.3 Log Archives . 143 3.2.4 Crash Reports . 143 3.2.5 Orphaned Files . 146 3.2.6 Aliases . 148 3.2.7 Removable Disks . 150 3.2.8 Core Dumps . 152 3.3 The Pane Applications . ..
Recommended publications
  • How to Set up IP Camera by Using a Macintosh Computer
    EDIMAX COMPUTER INC. Edimax IP Camera series How to set up IP Camera by using a Macintosh computer 2011 Edimax Computer 3350 Scott Blvd., Building #15 Santa Clara, California 95054, USA Phone 408-496-1105 • Fax 408-980-1530 www.edimax.us How to setup Edimax IP Camera by a Macintosh computer Introduction The most important thing to setup IP Camera is to assign a static IP address so the camera can work with your network. So far the Edimax IP Cam Admin utility is Windows based only and the program can not work for Macintosh computers. Macintosh users can follow this guide to set up Edimax IP camera. Step 1. Understand the IP address used in your network. Have your Macintosh computer operate as usual. Go into System Preferences. In System Preferences, Go to Network. Select the adapter you are using. It could be an Airport card, a third- party Wireless card, or an Ethernet Adapter. Write down the IP address, subnet mask, Router, and DNS server address. We have a usb wireless card in this example. Its IP address 10.0.1.2 told us that the IP addresses used in the network are 10.0.1.x. All the devices in the network have the first three octets the same, but the last octet number must be different. We decide to give our new camera an IP address 10.0.1.100 because no other computer device use 10.0.1.100. We temporarily disconnect the wireless adapter. You can turn off your Airport adapter if you use it to get on Internet.
    [Show full text]
  • Ubuntu Kung Fu
    Prepared exclusively for Alison Tyler Download at Boykma.Com What readers are saying about Ubuntu Kung Fu Ubuntu Kung Fu is excellent. The tips are fun and the hope of discov- ering hidden gems makes it a worthwhile task. John Southern Former editor of Linux Magazine I enjoyed Ubuntu Kung Fu and learned some new things. I would rec- ommend this book—nice tips and a lot of fun to be had. Carthik Sharma Creator of the Ubuntu Blog (http://ubuntu.wordpress.com) Wow! There are some great tips here! I have used Ubuntu since April 2005, starting with version 5.04. I found much in this book to inspire me and to teach me, and it answered lingering questions I didn’t know I had. The book is a good resource that I will gladly recommend to both newcomers and veteran users. Matthew Helmke Administrator, Ubuntu Forums Ubuntu Kung Fu is a fantastic compendium of useful, uncommon Ubuntu knowledge. Eric Hewitt Consultant, LiveLogic, LLC Prepared exclusively for Alison Tyler Download at Boykma.Com Ubuntu Kung Fu Tips, Tricks, Hints, and Hacks Keir Thomas The Pragmatic Bookshelf Raleigh, North Carolina Dallas, Texas Prepared exclusively for Alison Tyler Download at Boykma.Com Many of the designations used by manufacturers and sellers to distinguish their prod- ucts are claimed as trademarks. Where those designations appear in this book, and The Pragmatic Programmers, LLC was aware of a trademark claim, the designations have been printed in initial capital letters or in all capitals. The Pragmatic Starter Kit, The Pragmatic Programmer, Pragmatic Programming, Pragmatic Bookshelf and the linking g device are trademarks of The Pragmatic Programmers, LLC.
    [Show full text]
  • Filenet Image Services Installation and Configuration Procedures
    IBM FileNet Image Services 4.1.2 Installation and Configuration Procedures SC19-2680-01 IBM FileNet Image Services 4.1.2 Installation and Configuration Procedures SC19-2680-01 Note Before using this information and the product it supports, read the information in .“Notices” on page 273 This edition applies to version 4.1.2 of IBM FileNet Image Services (product number 5724-R95) and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright International Business Machines Corporation 1984, 2008. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Table of Contents About this document. 15 Revision Log . 15 Typographical Conventions. 16 Accessing IBM FileNet documentation . 16 Feedback . 17 Documentation feedback . 17 Product consumability feedback. 17 Installation Checklists and Required Skills. 18 Installation Checklist for AIX Servers . 18 Installation Checklist for HP-UX Servers. 20 Installation Checklist for Solaris Servers. 21 Installation Checklist for Windows Servers. 22 Required Skills . 23 Installation Planning Considerations. 24 Hardware Requirements . 24 Server Memory . 24 Total Swap Space . 24 Total Disk Space . 25 Multicultural support . 25 Additional Requirements for AIX . 26 Additional Requirements for HP-UX . 26 Additional Requirements for Solaris . 28 Additional Requirements for Windows Server . 28 Software Requirements. 29 Server Naming Convention . 29 Object Name . 29 Domain Name . 29 Organization Name . 29 Image Services software image . 29 RDBMS software . 30 IBM DB2 RDBMS Software . 30 Oracle RDBMS Software (FileNet-controlled) . 30 Oracle RDBMS Software (Site-controlled) . 30 MS-SQL RDBMS Software . 30 Debugging Software . 30 Debugger - AIX . 30 Debugger - HP-UX .
    [Show full text]
  • Mac OS 8 Update
    K Service Source Mac OS 8 Update Known problems, Internet Access, and Installation Mac OS 8 Update Document Contents - 1 Document Contents • Introduction • About Mac OS 8 • About Internet Access What To Do First Additional Software Auto-Dial and Auto-Disconnect Settings TCP/IP Connection Options and Internet Access Length of Configuration Names Modem Scripts & Password Length Proxies and Other Internet Config Settings Web Browser Issues Troubleshooting • About Mac OS Runtime for Java Version 1.0.2 • About Mac OS Personal Web Sharing • Installing Mac OS 8 • Upgrading Workgroup Server 9650 & 7350 Software Mac OS 8 Update Introduction - 2 Introduction Mac OS 8 is the most significant update to the Macintosh operating system since 1984. The updated system gives users PowerPC-native multitasking, an efficient desktop with new pop-up windows and spring-loaded folders, and a fully integrated suite of Internet services. This document provides information about Mac OS 8 that supplements the information in the Mac OS installation manual. For a detailed description of Mac OS 8, useful tips for using the system, troubleshooting, late-breaking news, and links for online technical support, visit the Mac OS Info Center at http://ip.apple.com/infocenter. Or browse the Mac OS 8 topic in the Apple Technical Library at http:// tilsp1.info.apple.com. Mac OS 8 Update About Mac OS 8 - 3 About Mac OS 8 Read this section for information about known problems with the Mac OS 8 update and possible solutions. Known Problems and Compatibility Issues Apple Language Kits and Mac OS 8 Apple's Language Kits require an updater for full functionality with this version of the Mac OS.
    [Show full text]
  • Mac OS X Server Administrator's Guide
    034-9285.S4AdminPDF 6/27/02 2:07 PM Page 1 Mac OS X Server Administrator’s Guide K Apple Computer, Inc. © 2002 Apple Computer, Inc. All rights reserved. Under the copyright laws, this publication may not be copied, in whole or in part, without the written consent of Apple. The Apple logo is a trademark of Apple Computer, Inc., registered in the U.S. and other countries. Use of the “keyboard” Apple logo (Option-Shift-K) for commercial purposes without the prior written consent of Apple may constitute trademark infringement and unfair competition in violation of federal and state laws. Apple, the Apple logo, AppleScript, AppleShare, AppleTalk, ColorSync, FireWire, Keychain, Mac, Macintosh, Power Macintosh, QuickTime, Sherlock, and WebObjects are trademarks of Apple Computer, Inc., registered in the U.S. and other countries. AirPort, Extensions Manager, Finder, iMac, and Power Mac are trademarks of Apple Computer, Inc. Adobe and PostScript are trademarks of Adobe Systems Incorporated. Java and all Java-based trademarks and logos are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. and other countries. Netscape Navigator is a trademark of Netscape Communications Corporation. RealAudio is a trademark of Progressive Networks, Inc. © 1995–2001 The Apache Group. All rights reserved. UNIX is a registered trademark in the United States and other countries, licensed exclusively through X/Open Company, Ltd. 062-9285/7-26-02 LL9285.Book Page 3 Tuesday, June 25, 2002 3:59 PM Contents Preface How to Use This Guide 39 What’s Included
    [Show full text]
  • WEKA Manual for Version 3-7-8
    WEKA Manual for Version 3-7-8 Remco R. Bouckaert Eibe Frank Mark Hall Richard Kirkby Peter Reutemann Alex Seewald David Scuse January 21, 2013 ⃝c 2002-2013 University of Waikato, Hamilton, New Zealand Alex Seewald (original Commnd-line primer) David Scuse (original Experimenter tutorial) This manual is licensed under the GNU General Public License version 3. More information about this license can be found at http://www.gnu.org/licenses/gpl-3.0-standalone.html Contents ITheCommand-line 11 1Acommand-lineprimer 13 1.1 Introduction . 13 1.2 Basic concepts . 14 1.2.1 Dataset . 14 1.2.2 Classifier . 16 1.2.3 weka.filters . 17 1.2.4 weka.classifiers . 19 1.3 Examples . 23 1.4 Additional packages and the package manager . .24 1.4.1 Package management . 25 1.4.2 Running installed learning algorithms . 26 II The Graphical User Interface 29 2LaunchingWEKA 31 3PackageManager 35 3.1 Mainwindow ............................. 35 3.2 Installing and removing packages . 36 3.2.1 Unofficalpackages ...................... 37 3.3 Usingahttpproxy.......................... 37 3.4 Using an alternative central package meta data repository . 37 3.5 Package manager property file . 38 4SimpleCLI 39 4.1 Commands . 39 4.2 Invocation . 40 4.3 Command redirection . 40 4.4 Command completion . 41 5Explorer 43 5.1 The user interface . 43 5.1.1 Section Tabs . 43 5.1.2 Status Box . 43 5.1.3 Log Button . 44 5.1.4 WEKA Status Icon . 44 3 4 CONTENTS 5.1.5 Graphical output . 44 5.2 Preprocessing . 45 5.2.1 Loading Data .
    [Show full text]
  • Where Do You Want to Go Today? Escalating
    Where Do You Want to Go Today? ∗ Escalating Privileges by Pathname Manipulation Suresh Chari Shai Halevi Wietse Venema IBM T.J. Watson Research Center, Hawthorne, New York, USA Abstract 1. Introduction We analyze filename-based privilege escalation attacks, In this work we take another look at the problem of where an attacker creates filesystem links, thereby “trick- privilege escalation via manipulation of filesystem names. ing” a victim program into opening unintended files. Historically, attention has focused on attacks against priv- We develop primitives for a POSIX environment, provid- ileged processes that open files in directories that are ing assurance that files in “safe directories” (such as writable by an attacker. One classical example is email /etc/passwd) cannot be opened by looking up a file by delivery in the UNIX environment (e.g., [9]). Here, an “unsafe pathname” (such as a pathname that resolves the mail-delivery directory (e.g., /var/mail) is often through a symbolic link in a world-writable directory). In group or world writable. An adversarial user may use today's UNIX systems, solutions to this problem are typ- its write permission to create a hard link or symlink at ically built into (some) applications and use application- /var/mail/root that resolves to /etc/passwd. A specific knowledge about (un)safety of certain directories. simple-minded mail-delivery program that appends mail to In contrast, we seek solutions that can be implemented in the file /var/mail/root can have disastrous implica- the filesystem itself (or a library on top of it), thus providing tions for system security.
    [Show full text]
  • Everything You Need to Know About Apple File System for Macos
    WHITE PAPER Everything you need to know about Apple File System for macOS Picture it: the ship date for macOS High Sierra has arrived. Sweat drips down your face; your hands shake as you push “upgrade.” How did I get here? What will happen to my policies? Is imaging dead? Fear not, because the move from HFS+ (the current Mac file system) to Apple File System (APFS) with macOS High Sierra is a good thing. And, with this handy guide, you’ll have everything you need to prepare your environment. In short, don’t fear APFS. To see how Jamf Pro can facilitate seamless macOS High Sierra upgrades in your environment, visit: www.jamf.com • After upgrading to macOS High Sierra, end users will Wait, how did we get here? likely see less total space consumed on a volume due to new cloning options. Bonus: End users can store HFS, and the little known MFS, were introduced in 1984 up to nine quintillion files on a single volume. with the original Macintosh. Fast forward 13 years, and • APFS provides us with a new feature called HFS+ served as a major file system upgrade for the Mac. snapshots. Snapshots make backups work more In fact, it was such a robust file system that it’s been the efficiently and offer a new way to revert changes primary file system on Apple devices. That is all about to back to a given point in time. As snapshots evolve change with APFS. and APIs become available, third-party vendors will Nineteen years after HFS+ was rolled out, Apple be able to build new workflows using this feature.
    [Show full text]
  • ® Apple® A/UXTM Release Notes Version 1.0 Ii APPLE COMPUTER, INC
    .® Apple® A/UXTM Release Notes Version 1.0 Ii APPLE COMPUTER, INC. UNIBUS, VAX, VMS, and VT100 are trademarks of Digital © Apple Computer, Inc., 1986 Equipment Corporation. 20525 Mariani Ave. Cupertino, California 95014 Simultaneously published in the (408) 996-1010 United States and Canada. Apple, the Apple logo, APPLE'S SYSTEM V AppleTalk, ImageWriter, IMPLEMENTATION A/UX LaserWriter, Macintosh, RELEASE 1.0 RUNNING ON A MacTerminal, and ProDOS are MACINTOSH II COMPUTER registered trademarks of Apple HAS BEEN TESTED BY THE Computer, Inc. AT&T-IS' SYSTEM V VERIFICATION SUITE AND Apple Desktop Bus, A!UX, CONFORMS TO ISSUE 2 OF EtherTalk, and Finder are AT&T-IS' SYSTEM V trademarks of Apple Computer, INTERFACE DEFINITION Inc. BASE PLUS KERNEL Ethernet is a registered EXTENSIONS. trademark of Xerox Corporation. IBM is a registered trademark, and PC-DOS is a trademark, of International Business Machines, Inc. - ITC Avant Garde Gothic, ITC Garamond, and ITC Zapf Dingbats are registered trademarks of International Typeface Corporation. Microsoft and MS-DOS are registered trademarks of Microsoft Corporation. NFS is a registered trademark, and Sun Microsystems is a trademark, of Sun Microsystems, Inc. NuBus is a trademark of Texas Instruments. POSTSCRIPT is a registered trademark, and TRANSCRIPT is a trademark, of Adobe Systems Incorporated. UNIX is a registered trademark of AT&T Information Systems. Introduction to A/UX Release Notes, Version 1.0 These release notes contain late-breaking information about release 1.0 of the A!UXI'M software for the Apple® Macintosh® II computer. This package contains two kinds of materials: o Specific information that was not available in time to be incorporated into the printed manuals.
    [Show full text]
  • Designing PCI Cards and Drivers for Power Macintosh Computers
    Designing PCI Cards and Drivers for Power Macintosh Computers Revised Edition Revised 3/26/99 Technical Publications © Apple Computer, Inc. 1999 Apple Computer, Inc. Adobe, Acrobat, and PostScript are Even though Apple has reviewed this © 1995, 1996 , 1999 Apple Computer, trademarks of Adobe Systems manual, APPLE MAKES NO Inc. All rights reserved. Incorporated or its subsidiaries and WARRANTY OR REPRESENTATION, EITHER EXPRESS OR IMPLIED, WITH No part of this publication may be may be registered in certain RESPECT TO THIS MANUAL, ITS reproduced, stored in a retrieval jurisdictions. QUALITY, ACCURACY, system, or transmitted, in any form America Online is a service mark of MERCHANTABILITY, OR FITNESS or by any means, mechanical, Quantum Computer Services, Inc. FOR A PARTICULAR PURPOSE. AS A electronic, photocopying, recording, Code Warrior is a trademark of RESULT, THIS MANUAL IS SOLD “AS or otherwise, without prior written Metrowerks. IS,” AND YOU, THE PURCHASER, ARE permission of Apple Computer, Inc., CompuServe is a registered ASSUMING THE ENTIRE RISK AS TO except to make a backup copy of any trademark of CompuServe, Inc. ITS QUALITY AND ACCURACY. documentation provided on Ethernet is a registered trademark of CD-ROM. IN NO EVENT WILL APPLE BE LIABLE Xerox Corporation. The Apple logo is a trademark of FOR DIRECT, INDIRECT, SPECIAL, FrameMaker is a registered Apple Computer, Inc. INCIDENTAL, OR CONSEQUENTIAL trademark of Frame Technology Use of the “keyboard” Apple logo DAMAGES RESULTING FROM ANY Corporation. (Option-Shift-K) for commercial DEFECT OR INACCURACY IN THIS purposes without the prior written Helvetica and Palatino are registered MANUAL, even if advised of the consent of Apple may constitute trademarks of Linotype-Hell AG possibility of such damages.
    [Show full text]
  • Chapter 1. Origins of Mac OS X
    1 Chapter 1. Origins of Mac OS X "Most ideas come from previous ideas." Alan Curtis Kay The Mac OS X operating system represents a rather successful coming together of paradigms, ideologies, and technologies that have often resisted each other in the past. A good example is the cordial relationship that exists between the command-line and graphical interfaces in Mac OS X. The system is a result of the trials and tribulations of Apple and NeXT, as well as their user and developer communities. Mac OS X exemplifies how a capable system can result from the direct or indirect efforts of corporations, academic and research communities, the Open Source and Free Software movements, and, of course, individuals. Apple has been around since 1976, and many accounts of its history have been told. If the story of Apple as a company is fascinating, so is the technical history of Apple's operating systems. In this chapter,[1] we will trace the history of Mac OS X, discussing several technologies whose confluence eventually led to the modern-day Apple operating system. [1] This book's accompanying web site (www.osxbook.com) provides a more detailed technical history of all of Apple's operating systems. 1 2 2 1 1.1. Apple's Quest for the[2] Operating System [2] Whereas the word "the" is used here to designate prominence and desirability, it is an interesting coincidence that "THE" was the name of a multiprogramming system described by Edsger W. Dijkstra in a 1968 paper. It was March 1988. The Macintosh had been around for four years.
    [Show full text]
  • The Open Scripting Architecture: Automating, Integrating, and Customizing Applications
    The Open Scripting Architecture: Automating, Integrating, and Customizing Applications Unpublished manuscript, 1993 William R. Cook Warren H. Harris Apple Computer Apple Computer Research Topic areas: Language design and implementation, tools and environments, components and frameworks, concurrent and distributed systems, databases and persistence. Abstract The Open Scripting Architecture combines aspects of object-oriented programming, distributed computation, database queries, and dynamic languages into a powerful and practical system for automation, integration, and customization of applications and system services. Applications are integrated together with distributed messaging. The messages operate upon user-level application objects, like windows and spreadsheet cells that are identified by queries over properties and document containment structure. A general-purpose scripting language automates message sending and handling, and supports persistence and mobile objects. Applications call on scripting services to customize the behavior of their objects through a generic script management API. 1 Introduction The Open Scripting Architecture (OSA) is a comprehensive infrastructure for automating complex or repetitive tasks, integrating distributed applications and system services, and customizing application behavior. These end-user benefits are supported by a synergistic combination of technologies: distributed messaging and referencing of application objects, object-oriented scripting languages, and script development and management tools. Object-oriented concepts are used throughout the architecture, in the scripting language, the system, and the applications. The OSA is unique in several respects. First, it decouples the clients of scripting services (applications) from the providers of those services (language processors like AppleScript™). This decoupling allows for uniform scriptability across all applications in the same way a graphics toolbox provides a uniform GUI.
    [Show full text]