Setting up Mac OS X Server (10.2) for Xserve
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Designing PCI Cards and Drivers for Power Macintosh Computers
Designing PCI Cards and Drivers for Power Macintosh Computers Revised Edition Revised 3/26/99 Technical Publications © Apple Computer, Inc. 1999 Apple Computer, Inc. Adobe, Acrobat, and PostScript are Even though Apple has reviewed this © 1995, 1996 , 1999 Apple Computer, trademarks of Adobe Systems manual, APPLE MAKES NO Inc. All rights reserved. Incorporated or its subsidiaries and WARRANTY OR REPRESENTATION, EITHER EXPRESS OR IMPLIED, WITH No part of this publication may be may be registered in certain RESPECT TO THIS MANUAL, ITS reproduced, stored in a retrieval jurisdictions. QUALITY, ACCURACY, system, or transmitted, in any form America Online is a service mark of MERCHANTABILITY, OR FITNESS or by any means, mechanical, Quantum Computer Services, Inc. FOR A PARTICULAR PURPOSE. AS A electronic, photocopying, recording, Code Warrior is a trademark of RESULT, THIS MANUAL IS SOLD “AS or otherwise, without prior written Metrowerks. IS,” AND YOU, THE PURCHASER, ARE permission of Apple Computer, Inc., CompuServe is a registered ASSUMING THE ENTIRE RISK AS TO except to make a backup copy of any trademark of CompuServe, Inc. ITS QUALITY AND ACCURACY. documentation provided on Ethernet is a registered trademark of CD-ROM. IN NO EVENT WILL APPLE BE LIABLE Xerox Corporation. The Apple logo is a trademark of FOR DIRECT, INDIRECT, SPECIAL, FrameMaker is a registered Apple Computer, Inc. INCIDENTAL, OR CONSEQUENTIAL trademark of Frame Technology Use of the “keyboard” Apple logo DAMAGES RESULTING FROM ANY Corporation. (Option-Shift-K) for commercial DEFECT OR INACCURACY IN THIS purposes without the prior written Helvetica and Palatino are registered MANUAL, even if advised of the consent of Apple may constitute trademarks of Linotype-Hell AG possibility of such damages. -
Security Analysis and Decryption of Lion Full Disk Encryption
Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption Omar Choudary Felix Grobert¨ ∗ Joachim Metz ∗ University of Cambridge [email protected] [email protected] [email protected] Abstract 1 Introduction Since the launch of Mac OS X 10.7, also known as Lion, With the launch of Mac OS X 10.7 (Lion), Apple has Apple includes a volume encryption software named introduced a volume encryption mechanism known as FileVault 2 [8] in their operating system. While the pre- FileVault 2. Apple only disclosed marketing aspects of vious version of FileVault (introduced with Mac OS X the closed-source software, e.g. its use of the AES-XTS 10.3) only encrypted the home folder, FileVault 2 can en- tweakable encryption, but a publicly available security crypt the entire volume containing the operating system evaluation and detailed description was unavailable until (this is commonly referred to as full disk encryption). now. This has two major implications: first, there is now a new functional layer between the encrypted volume and We have performed an extensive analysis of the original file system (typically a version of HFS Plus). FileVault 2 and we have been able to find all the This new functional layer is actually a full volume man- algorithms and parameters needed to successfully read ager which Apple called CoreStorage [10] Although this an encrypted volume. This allows us to perform forensic full volume manager could be used for more than volume investigations on encrypted volumes using our own encryption (e.g. mirroring, snapshots or online storage tools. -
Blacklight 10.2
BlackLight 10.2 Release Notes October 30, 2020 Thank you for using BlackBag Technologies products. The Release Notes for this version include important information about new features and improvements made to BlackLight. In addition, this document contains known limitations, supported versions, and updated system requirements. While this information is complete at time of release, it is subject to change without notice and is provided for informational purposes only. Summary To enhance our forensic analysis tool, BlackLight 10.2 includes these new or improved features. • Timeline • Optical character recognition • Tagging improvements • Ingest additional Cellebrite mobile extractions • A first look at Activity Correlation for Windows Features Timeline The new Timeline view lets you access more information from one place. It responds quickly, even with many items in a case file, and it is cleaner and easier to navigate than the previous version. Timeline view allows you to easily focus on all activity during a time period you specify. You can see and sort by all timestamps for each artifact in the Timeline view. You can also see the file path, so you can easily view the file in the File Browser view and investigate further. You can tag items in the Timeline view just as you would in other views within BlackLight. Optical Character Recognition This release introduces the ability to process image (picture) based files for text. Optical character recognition (OCR) converts text detected in the image into plain text which can be indexed and then searched. This process is limited to these image types. .pdf, .tiff, .bmp, .png, .jpg, and .gif You can run OCR processing in three ways. -
Specifications for Power Macintosh G3 Minitower Computers Main Unit
Technical Information Specifications for Power Macintosh G3 minitower computers Main unit Processor PowerPC™ G3 processor at one of the following speeds: Processor speed System bus speed 233 megahertz (MHz) 66 MHz 266 MHz 66 MHz 300 MHz 66 MHz Memory Dynamic Random-Access Memory The computer comes with a minimum of 32 megabytes (MB) of Synchronous Dynamic Random-Access Memory (SDRAM), supplied in removable Dual Inline Memory Modules (DIMMs). The main logic board has three expansion slots that accept DIMMs that meet these specifications: m 8, 16, 32, 64, or 128 MB m 3.3 volt (V), unbuffered, 64-bit wide, 168-pin m 100 MHz/10 nanosecond (ns) cycle time or faster using SDRAM Important Power Macintosh G3 computers use SDRAM DIMMs. DIMMs from older Macintosh computers are not compatible with your computer and should not be used even though they will fit into the DRAM DIMM slots. To increase DRAM to the maximum of 384 MB, fill all three slots with 128 MB DIMMs. Video memory Your computer comes with 2 MB of Synchronous Graphic RAM (SGRAM) video memory built into the logic board. The logic board contains a video memory expansion slot that accepts a Small Outline DIMM (SO-DIMM) to increase video memory up to a maximum of 6 MB. Depending on the configuration you purchased, an SO-DIMM may already be installed in the slot. The DIMM must meet these specifications: m a 2 MB or 4 MB SGRAM SO-DIMM m 32-bit wide, 144-pin m 83 MHz/12 ns cycle time or faster Important Use only an SGRAM SO-DIMM. -
Read Before You Install Mac OS X
Read Before You Install Mac OS X This document provides important information about installing Mac OS X that isn’t in the Welcome to Mac OS X book. Read this document before you install Mac OS X to learn about supported computers, system requirements, and known issues. For more information about Mac OS X, visit this Apple Web site: m www.apple.com/macos/ For the latest information about this release of Mac OS X, open Mac Help and click the More link under News. For information about the support available for this product, see the AppleCare Software Services and Support Guide included with Mac OS X. Supported computers You can install this version of Mac OS X on any of the following computers: m Power Mac G4 m Power Macintosh G3 m PowerBook G4 m PowerBook G3 (except the original PowerBook G3) m iMac m iBook System requirements Your computer must have m at least 128 MB of RAM m a built-in display or a display connected to an Apple-supplied video card m at least 1.5 GB of disk space available 1 Starting installation To start installing Mac OS X, double-click the Install Mac OS X icon. In Mac OS 9 In Mac OS X If the Installer does not open, insert the CD and restart your computer while holding down the C key. If the Installer still does not open, try selecting the Install Mac OS X CD as your startup disk by using Startup Disk preferences (if you are using Mac OS X) or the Startup Disk control panel (if you are using Mac OS 9). -
Apple File System Reference
Apple File System Reference Developer Contents About Apple File System 7 General-Purpose Types 9 paddr_t .................................................. 9 prange_t ................................................. 9 uuid_t ................................................... 9 Objects 10 obj_phys_t ................................................ 10 Supporting Data Types ........................................... 11 Object Identifier Constants ......................................... 12 Object Type Masks ............................................. 13 Object Types ................................................ 14 Object Type Flags .............................................. 20 EFI Jumpstart 22 Booting from an Apple File System Partition ................................. 22 nx_efi_jumpstart_t ........................................... 24 Partition UUIDs ............................................... 25 Container 26 Mounting an Apple File System Partition ................................... 26 nx_superblock_t ............................................. 27 Container Flags ............................................... 36 Optional Container Feature Flags ...................................... 37 Read-Only Compatible Container Feature Flags ............................... 38 Incompatible Container Feature Flags .................................... 38 Block and Container Sizes .......................................... 39 nx_counter_id_t ............................................. 39 checkpoint_mapping_t ........................................ -
Dell Encryption Enterprise for Mac Administrator Guide V10.9
Dell Encryption Enterprise for Mac Administrator Guide v10.9 March 2021 Rev. A02 Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. © 2012-2021 Dell Inc. All rights reserved. Registered trademarks and trademarks used in the Dell Encryption and Endpoint Security Suite Enterprise suite of documents: Dell™ and the Dell logo, Dell Precision™, OptiPlex™, ControlVault™, Latitude™, XPS®, and KACE™ are trademarks of Dell Inc. Cylance®, CylancePROTECT, and the Cylance logo are registered trademarks of Cylance, Inc. in the U.S. and other countries. McAfee® and the McAfee logo are trademarks or registered trademarks of McAfee, Inc. in the US and other countries. Intel®, Pentium®, Intel Core Inside Duo®, Itanium®, and Xeon® are registered trademarks of Intel Corporation in the U.S. and other countries. Adobe®, Acrobat®, and Flash® are registered trademarks of Adobe Systems Incorporated. Authen tec® and Eikon® are registered trademarks of Authen tec. AMD® is a registered trademark of Advanced Micro Devices, Inc. Microsoft®, Windows®, and Windows Server®, Windows Vista®, Windows 7®, Windows 10®, Active Directory®, Access®, BitLocker®, BitLocker To Go®, Excel®, Hyper-V®, Outlook®, PowerPoint®, Word®, OneDrive®, SQL Server®, and Visual C++® are either trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries. VMware® is a registered trademark or trademark of VMware, Inc. in the United States or other countries. -
Power Macintosh G3 Desktop
K Service Source Power Macintosh G3 Desktop K Service Source Hot Issues Power Macintosh G3 Desktop Hot Issues Introduction - 1 Introduction This chapter is designed to highlight unique or high- priority product issues that you should be aware of before servicing the Power Macintosh G3 Desktop computer. This chapter alerts you to important issues and provides links to other areas in the manual where more complete information can be found. This chapter is not intended to replace other parts of this manual; it merely provides a pointer to pertinent information in those chapters. To familiarize yourself with a new product family, always read the Basics chapter in its entirety. Hot Issues Shared Logic Board - 2 Shared Logic Board The Power Macintosh G3 Desktop and Minitower computers use the same logic board, but there are jumper settings that differ between them (see “Jumper Location J28” and “Jumper Location J16” in the Troubleshooting chapter). Processor Module Vs. Card Whereas previous Power Macintosh computers featured a user-installable processor card, this logic board uses a processor module that must not be removed by the customer (see “Processor Module” in the Take-Apart chapter). Hot Issues Power Supply Jumper - 3 Power Supply Jumper The Power Macintosh G3 Desktop logic board has a power supply jumper, which is installed at J28. The setting of this jumper differs between the Power Mac G3 Desktop and Minitower. Failure to install this jumper in the correct position may result in a computer that won’t boot up. (See “Jumper Location J28” in the Troubleshooting chapter.) Processor Module Jumper The Power Macintosh G3 Desktop logic board has a processor module jumper, which is installed at J16. -
Paragon Ntfs for Mac Os X™
PARAGON Technologie GmbH, Systemprogrammierung Heinrich-von-Stephan-Str. 5c 79100 Freiburg, Germany Tel. +49 (0) 761 59018201 Fax +49 (0) 761 59018130 Internet www.paragon-software.com E-mail [email protected] PARAGON NTFS FOR MAC OS X™ USER MANUAL 2 CONTENTS Introduction .......................................................................................................................... 3 Features Overview ................................................................................................................. 3 Key Features ............................................................................................................................................... 3 Supported Media ........................................................................................................................................ 3 Getting Started ...................................................................................................................... 4 Distribution ................................................................................................................................................ 4 Registration ................................................................................................................................................ 4 To Register as a New User ...................................................................................................................................................... 4 To Register a New Product .................................................................................................................................................... -
Chapter 13 MAC OS X FORENSICS
Chapter 13 MAC OS X FORENSICS Philip Craiger and Paul Burke Abstract This paper describes procedures for conducting forensic examinations of Apple Maca running Mac OS X. The target disk mode is used to create a forensic duplicate of a Mac hard drive and preview it. Procedures are discussed for recovering evidence from allocated space, unallocated space, slack space and virtual memory. Furthermore, procedures are described for recovering trace evidence from Mac OS X default email, web browser and instant messaging applications, as well as evidence pertaining to commands executed from a terminal. Keywords: Macintosh computers, Mac OS X forensics 1. Introduction Since its introduction in 1984, the Apple Macintosh has an enjoyed a small, albeit vocal, user base. Nevertheless, it is surprising that very little has been published regarding forensic examinations of Macintosh computers. This paper describes procedures for conducting forensic examinations of Apple Macs running Mac OS X. Due to space limitations, certain as- sumptions are made to limit the scope of our coverage. These assump- tions are: (i) The forensic computer and the suspect's computer run version 10.4.3 of Mac OS X, the latest version as of November 2005; (ii) the suspect has not set the Open Firmware password (Open Firmware is a processor and system-independent boot firmware used by PowerPC- based Macs, analogous to the x86 PC BIOS); (iii) the suspect has not used encryption via the Mac OS X FileVault, a virtual volume encrypted with 128-bit AESj and (iv) the suspect's hard drive is formatted with the Hierarchical File System Plus , commonly referred to as HFS+, the default file system since Mac OS X's release in 2000. -
Security Analysis and Decryption of Filevault 2
Chapter 23 SECURITY ANALYSIS AND DECRYPTION OF FILEVAULT 2 Omar Choudary, Felix Grobert and Joachim Metz Abstract This paper describes the first security evaluation of FileVault 2, a vol- ume encryption mechanism that was introduced in Mac OS X 10.7 (Lion). The evaluation results include the identification of the algo- rithms and data structures needed to successfully read an encrypted volume. Based on the analysis, an open-source tool named libfvde was developed to decrypt and mount volumes encrypted with FileVault 2. The tool can be used to perform forensic investigations on FileVault 2 encrypted volumes. Additionally, the evaluation discovered that part of the user data was left unencrypted; this was subsequently fixed in the CVE-2011-3212 operating system update. Keywords: Volume encryption, full disk encryption, FileVault 2 1. Introduction The FileVault 2 volume encryption software was first included in Mac OS X version 10.7 (Lion). While the earlier version of FileVault (intro- duced in Mac OS X 10.3) only encrypts the home folder, FileVault 2 can encrypt the entire volume containing the operating system – referred to as “full disk encryption.” This has two major implications. The first is that there is a new functional layer between the encrypted volume and the original filesystem (typically a version of HFS Plus). This new functional layer is actually a full volume manager, which Apple calls CoreStorage. Although the full volume manager could be used for more than volume encryption (e.g., mirroring, snapshots and online storage migration), we do not know of any other applications. Therefore, in the rest of this paper we use the term CoreStorage to refer to the com- bination of the encrypted volume and the functional layer that links the volume to the HFS Plus filesystem. -
Wireless PCI Card for Macintosh and Windows Desktops
Wireless PCI Card for Macintosh and Windows Desktops KEY FEATURES Wireless data transfer rates up to 54 Mbps Compatible with Apple AirPort Extreme and other 802.11g wireless hubs Backward-compatible with 802.11b devices Requires Mac OS X 10.2.6 or later and AirPort Extreme driver 3.1 or later Supports Windows 98SE, Me, 2000, XP — NETWORK WITHOUT WIRES! Part No: G54-PCI Need an easy way to move fi les between computers or share an Internet connection, but don’t have an Ethernet outlet nearby? Now you can add Radio Specifi cations wireless networking to most any desktop computer—the Sonnet Aria Frequency 2.412~2.497 GHz ISM frequency band extreme PCI makes it simple. This affordable adapter card plugs into any Operating Channels 802.11b: 11 for North America, 14 for available PCI slot, and confi guration is a breeze; this is networking made Japan, 13 for Europe (ETSI) easy. Whether you are creating a new network, or just adding on, the 802.11g: 13 for North America, 13 for Europe (ETSI), 13 for Japan Aria extreme PCI does it without wires! Security Hardware 64/128-bit WEP engine; WEP weak-key avoidance, TKIP, hardware AES engine supporting CCM and OCB, SPECIFICATIONS 802.1x, SSN Software Output Power Maximum 15.5 dBm Operating System Requirements Mac OS X Version 10.2.6 or later with Data Rates 802.11b -Maximum 11 Mbps. Auto- AirPort drivers 3.1 or later ranging: 1, 2, 5.5, and 11 Mbps Windows 98 SE, Me, 2000 or XP 802.11g -Maximum 54 Mbps.