Apple Pro Training Series: OS X Support Essentials 10.9 Apple Pro Training Series

Network Configuration

Locations: One selected by user

Automatic Work Home Test

Ethernet Wi-Fi Ethernet 2 FireWire VPN

Services: Multiple services activate and prioritized based on service order

Understand OS X Mavericks underlying technologies, Configurestand-alone and networked Mac Troubleshoot software and hardware issues

software components, and industry-standard protocols. with step-by-step instructions. using Apple-recommended procedures and tools. Supporting and Troubleshooting OS X Mavericks OS X Support Essentials 10.9

The Apple-Certified Way to Learn

This is the official curriculum of the Apple Mavericks 101: OS X The Apple Pro Training Series is both a self-paced Support Essentials 10.9 course and preparation for Apple learning tool and the official curriculum of the Apple Training and Certified Support Professional (ACSP) 10.9 certification— Certification program. Upon completing the course material in this as well as a top-notch primer for anyone who needs to support, book, you can become an Apple Certified Support Professional by troubleshoot, or optimize OS X Mavericks. This guide provides passing the OS X Support Essentials 10.9 Exam. Work through this comprehensive coverage of Mavericks and is part of the Apple book as self-study material or attend a class at an Apple Authorized Pro Training series—the only Apple-certified books on the Training Center. To learn more, please visit training.apple.com. market. Designed for support technicians, help desk specialists, and ardent Mac users, this guide takes you deep inside the Also in the Apple Pro Training Series: Mavericks . Readers will find in-depth, step-by-  OS X Server Essentials 10.9 step instruction on everything from installing and configuring  X Mavericks to managing networks and system administration.  X Whether you run a lab or an IT department, you’ll About the Authors learn to set up users, configure , manage Kevin M. White has been an Apple Certified Trainer since 2000 Apple Pro Training Series security and permissions, use diagnostic and repair tools, and is a regular presenter at industry events. Kevin co-authored his troubleshoot peripheral devices, and more—all on your way first book in 2005 and has subsequently authored or co-authored to preparing for the industry-standard ACSP certification. several books including OS X Mountain Lion Support Essentials.

 Covers updated system utilities and new features of OS X Kevin also serves the through his company, Mavericks, including iCloud and Tags. Macjutsu Inc., which is dedicated to sharing knowledge of the “Apple way.”  Features authoritative explanations of underlying technologies, OS X Support troubleshooting, system administration, and much more. Gordon Davisson has spent over 20 years working with Apple  Focused lessons take you step by step through practical, real- hardware and software and designing and implementing world tasks. networking solutions. An Apple Certified System Administrator,  Lesson files and bonus material available for download— Gordon has also been an Apple Certified Trainer since 2002 and is Essentials 10.9 including lesson review questions summarizing what you’ve currently a consultant and instructor teaching multiple Mac and learned to prepare you for the Apple certification exam. OS X courses. Gordon was the co-author of OS X Mountain Lion Support Essentials. Supporting and Troubleshooting OS X Mavericks

Companion Web Page: Davisson White www.peachpit.com/apts.osxmavericks USA $64.99 Canada $67.99

Level ISBN-13: 978-0-321-96355-0 : Beginner/Intermediate ISBN-10: 0-321-96355-5

Peachpit Press Category: www.peachpit.com Requires: OS X Mavericks 56499 Kevin M. White and Gordon Davisson

9 780321 963550

Certification exam preparation for: Lesson and media files available for download Apple Certified Support Professional 10.9

APTS_SuppEssls10.9_cover.indd 1 11/25/13 5:14 PM Apple Pro Training Series OS X Support Essentials 10.9 Kevin M. White and Gordon Davisson Apple Pro Training Series: OS X Support Essentials 10.9 Kevin M. White and Gordon Davisson Copyright © 2014 by Kevin M. White and Gordon Davisson

Peachpit Press www.peachpit.com

To report errors, please send a note to [email protected]. Peachpit Press is a division of .

Apple Series Editor: Lisa McClain Production Coordinator: Kim Elmore, Happenstance Type-O-Rama Technical Editor: Adam Karneboge Apple Reviewer: Shane Ross Apple Project Managers: Shane Ross, John Signa Copy Editors: Wendy Katz, Liz Merfeld Proofreader: Liz Merfeld Compositors: Craig Johnson & Craig Woods, Happenstance Type-O-Rama Indexer: Jack Lewis Cover Illustration: Paul Mavrides Cover Production: Cody Gates, Happenstance Type-O-Rama

Notice of Rights All rights reserved. No part of this book may be reproduced or transmitted in any form by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. For information on getting permission for reprints and excerpts, contact [email protected].

Notice of Liability The information in this book is distributed on an “As Is” basis, without warranty. While every precaution has been taken in the preparation of the book, neither the authors nor Peachpit shall have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the instructions contained in this book or by the computer software and hardware products described in it.

IMPORTANT: Some of the exercises contained in this guide can be temporarily disruptive, and some exercises, if performed incorrectly, could result in data loss or damage to system files. As such, it’s recommended that you perform these exercises on a Mac computer that is not critical to your daily productivity.

Trademarks Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and Peachpit was aware of a trademark claim, the designations appear as requested by the owner of the trademark. All other product names and services identified throughout this book are used in editorial fashion only and for the benefit of such companies with no intention of infringement of the trademark. No such use, or the use of any trade name, is intended to convey endorsement or other affilia- tion with this book.

ISBN 13: 978-0-321-96355-0 ISBN 10: 0-321-96355-5 9 8 7 6 5 4 3 2 1 Printed and bound in the of America I could not have made this journey without the support of my family and loving wife, Michelle. This book is dedicated to my greatest works; Logan, Sawyer, and Emily. — Kevin White

Much appreciation to my amazing wife, Berit Benson, and her uncanny ability to sense when I needed coffee the most. — Gordon Davisson

Acknowledgments In addition to the amazing Peachpit staff members who were instrumental in completing this work, we would like to thank the development team for their hard work: Adam Karneboge, Shane Ross, and John Signa. Additional thanks go out to those involved with Apple Training & Communications including Eugene Evon, Judy Lawrence, Tyson Vu, Cindy Waller, Arek Dreyer, Ben Greisler, Benjamin Levy, Patrick Gallagher, and Ben- jamin Beasley Jr. Also, the accuracy of this guide is greatly enhanced because of feedback from those who reviewed early versions of the guide, including those who attended the Mavericks Support Essentials Beta class.

Contents at a Glance

Installation and Configuration Lesson 1 About This Guide...... 3 Lesson 2 Install OS X Mavericks ...... 9 Lesson 3 Setup and Configuration...... 47 Lesson 4 OS X Recovery...... 87 Lesson 5 OS X Software Updates...... 111

User Accounts Lesson 6 User Accounts...... 129 Lesson 7 User Home Folders...... 157 Lesson 8 System Security...... 175 Lesson 9 Keychain Management ...... 211

File Systems Lesson 10 File Systems and Storage...... 235 Lesson 11 FileVault 2 ...... 273 Lesson 12 Permissions and Sharing...... 293 Lesson 13 Troubleshooting...... 317

Data Management Lesson 14 Hidden Items and ...... 349 Lesson 15 System Resources...... 363 Lesson 16 Metadata and ...... 381 Lesson 17 File Archives ...... 401 Lesson 18 Time Machine...... 413

v vi Contents at a Glance

Applications and Processes Lesson 19 Application Installation...... 441 Lesson 20 Document Management...... 489 Lesson 21 Application Management and Troubleshooting...... 533

Network Configuration Lesson 22 Network Essentials...... 579 Lesson 23 Advanced Network Configuration ...... 605 Lesson 24 Network Troubleshooting...... 653

Network Services Lesson 25 Network Services ...... 677 Lesson 26 Sharing and Personal Firewall ...... 729

System Management Lesson 27 Peripherals and Drivers...... 773 Lesson 28 Print and Scan...... 799 Lesson 29 System Troubleshooting ...... 839

Index...... 875

Appendix A Lesson Review Questions and Answers...... A-1 Appendix B Additional Resources...... B-1

Bonus chapters mentioned in this are available after the index. See last page of this eBook for instructions on downloading your lesson files. Table of Contents

Installation and Configuration

Lesson 1 About This Guide ...... 3 Learning Methodology ...... 4 Lesson Structure...... 4 Exercise Requirements...... 5 Apple Training and Certification...... 7

Lesson 2 Install OS X Mavericks...... 9 Reference 2.1 About OS X Mavericks ...... 9 Reference 2.2 Installation Choices...... 12 Reference 2.3 Before Upgrading a Previous System...... 13 Reference 2.4 Preparing the System Disk ...... 20 Reference 2.5 Upgrading and Installing...... 22 Reference 2.6 Installer Troubleshooting ...... 27 Exercise 2.1 Prepare a Mac for Upgrade...... 28 Exercise 2.2 Upgrade to OS X Mavericks...... 36 Exercise 2.3 Erase a Mac System and Install OS X Mavericks...... 40 Exercise 2.4 Verify System Installation...... 45

Lesson 3 Setup and Configuration ...... 47 Reference 3.1 Setup Assistant...... 47 Reference 3.2 Migration Assistant ...... 52 Reference 3.3 System Preferences...... 55 Reference 3.4 Profiles...... 58 Reference 3.5 ...... 60

vii viii Contents

Exercise 3.1 Configure a New OS X System for Exercises...... 63 Exercise 3.2 Configure an Existing OS X System for Exercises...... 66 Exercise 3.3 Examine System Preferences...... 69 Exercise 3.4 Download the Student Materials in a ...... 74 Exercise 3.5 Download the Student Materials Independently...... 78 Exercise 3.6 Install a Configuration Profile...... 81 Exercise 3.7 Examine System Information...... 84

Lesson 4 OS X Recovery...... 87 Reference 4.1 Startup from OS X Recovery ...... 87 Reference 4.2 OS X Recovery Utilities...... 88 Reference 4.3 External OS X Recovery Disks...... 91 Exercise 4.1 Use OS X Recovery...... 93 Exercise 4.2 Create an OS X Recovery Disk...... 99 Exercise 4.3 Create an OS X Install Disk ...... 106

Lesson 5 OS X Software Updates...... 111 Reference 5.1 Automatic Software Updates...... 111 Reference 5.2 Manual Software Updates...... 117 Reference 5.3 Installation History...... 120 Exercise 5.1 Manually Install Software Updates in a Classroom. . . . . 121 Exercise 5.2 Manually Install Software Updates Independently. . . . . 122 Exercise 5.3 Use Automatic Software Update ...... 124

User Accounts

Lesson 6 User Accounts ...... 129 Reference 6.1 User Account Management...... 129 Reference 6.2 Parental Controls...... 136 Reference 6.3 Login and Fast User Switching...... 138 Exercise 6.1 Manage User Accounts ...... 144 Exercise 6.2 Create a Managed User Account...... 152 Contents ix

Lesson 7 User Home Folders ...... 157 Reference 7.1 Home Folder Contents ...... 157 Reference 7.2 Deleting User Accounts...... 160 Reference 7.3 Migrating and Restoring Home Folders...... 161 Exercise 7.1 Restore a Deleted User Account...... 165

Lesson 8 System Security ...... 175 Reference 8.1 User Account Security...... 175 Reference 8.2 Account Passwords...... 177 Reference 8.3 Resetting Passwords...... 181 Reference 8.4 System Security Settings...... 187 Reference 8.5 Firmware Password ...... 194 Exercise 8.1 Reset Account Passwords in OS X Recovery...... 196 Exercise 8.2 Reset Account Passwords ...... 199 Exercise 8.3 Synchronize Keychain Passwords...... 203 Exercise 8.4 Use a Firmware Password...... 208

Lesson 9 Keychain Management...... 211 Reference 9.1 Keychain System...... 211 Reference 9.2 Keychain Management ...... 213 Reference 9.3 iCloud Keychain...... 220 Exercise 9.1 Manage Keychains...... 225

File Systems

Lesson 10 File Systems and Storage...... 235 Reference 10.1 File System Components...... 235 Reference 10.2 Managing File Systems...... 240 Reference 10.3 Mounting, Unmounting, and Ejecting ...... 249 Exercise 10.1 Repartition a Disk Dynamically...... 254 Exercise 10.2 Erase and Partition a Disk...... 256 Exercise 10.3 Examine Disk Ejection...... 260 Exercise 10.4 Encrypt a Volume...... 264 Exercise 10.5 Securely Erase Disk Data...... 268 x Contents

Lesson 11 FileVault 2...... 273 Reference 11.1 FileVault 2 Technology ...... 273 Reference 11.2 Enabling FileVault 2...... 275 Reference 11.3 FileVault 2 Recovery...... 278 Exercise 11.1 Enable FileVault 2...... 280 Exercise 11.2 Restart a FileVault 2 Protected System...... 284 Exercise 11.3 Use a FileVault 2 Recovery Key...... 287 Exercise 11.4 Turn Off FileVault 2...... 290

Lesson 12 Permissions and Sharing ...... 293 Reference 12.1 File System Permissions...... 293 Reference 12.2 Permissions for Sharing...... 300 Reference 12.3 Managing Permissions...... 304 Exercise 12.1 Create Items with Default Permissions...... 309 Exercise 12.2 Test Permissions Changes...... 313

Lesson 13 File System Troubleshooting ...... 317 Reference 13.1 File System Inspection...... 317 Reference 13.2 Troubleshoot Partitions and Volumes...... 321 Reference 13.3 Troubleshoot File System Permissions ...... 325 Exercise 13.1 Examine Local Storage...... 328 Exercise 13.2 Repair Partitions and Volumes in Target Disk Mode. . . . 334 Exercise 13.3 Repair Partitions and Volumes in OS X Recovery Mode. . 341

Data Management

Lesson 14 Hidden Items and Shortcuts...... 349 Reference 14.1 Hidden Items...... 349 Reference 14.2 Bundles and Packages ...... 352 Reference 14.3 File System Shortcuts...... 354 Exercise 14.1 Navigate Hidden Items ...... 359

Lesson 15 System Resources...... 363 Reference 15.1 OS X File Structure...... 363 Reference 15.2 Font Resources and ...... 371 Exercise 15.1 Manage Font Resources...... 375 Contents xi

Lesson 16 Metadata and Spotlight...... 381 Reference 16.1 File System Metadata...... 381 Reference 16.2 Spotlight Search ...... 386 Exercise 16.1 Examine File Metadata ...... 393 Exercise 16.2 Search Using Spotlight...... 396

Lesson 17 File Archives...... 401 Reference 17.1 File Archive Comparison ...... 401 Reference 17.2 Zip Archives ...... 402 Reference 17.3 Disk Images...... 404 Exercise 17.1 Create Disk Images...... 409

Lesson 18 Time Machine ...... 413 Reference 18.1 Time Machine Architecture...... 413 Reference 18.2 Configuring Time Machine ...... 418 Reference 18.3 Restoring from Time Machine...... 423 Exercise 18.1 Enable and Configure Time Machine...... 429 Exercise 18.2 Restore Using Time Machine...... 433

Applications and Processes

Lesson 19 Application Installation ...... 441 Reference 19.1 The Mac ...... 441 Reference 19.2 Application Environments ...... 452 Reference 19.3 Application Security...... 458 Reference 19.4 Traditional Installation Methods...... 463 Reference 19.5 Removing Installed Software ...... 466 Exercise 19.1 Use the ...... 467 Exercise 19.2 Use an Installer Package ...... 477 Exercise 19.3 Use a Drag-and-Drop Install ...... 480 Exercise 19.4 Remove Applications...... 484

Lesson 20 Document Management...... 489 Reference 20.1 Launch Services ...... 489 Reference 20.2 ...... 493 Reference 20.3 Auto Save and Versions...... 496 xii Contents

Reference 20.4 Document Locking...... 503 Reference 20.5 Documents in iCloud...... 506 Reference 20.6 Automatic Resume...... 511 Exercise 20.1 Use Alternate Applications...... 514 Exercise 20.2 Use Auto Save and Versions...... 518 Exercise 20.3 Manage Document Locking...... 521 Exercise 20.4 Store Documents in iCloud ...... 523 Exercise 20.5 Manage Automatic Behaviors...... 528

Lesson 21 Application Management and Troubleshooting...... 533 Reference 21.1 Applications and Processes...... 533 Reference 21.2 Monitoring Applications and Processes...... 538 Reference 21.3 Application Troubleshooting ...... 542 Reference 21.4 Assistive Technologies...... 552 Reference 21.5 Managing Dashboard...... 557 Exercise 21.1 Force Applications to Quit ...... 561 Exercise 21.2 Troubleshoot Preferences ...... 568 Exercise 21.3 Examine Application Diagnostics...... 573

Network Configuration

Lesson 22 Network Essentials ...... 579 Reference 22.1 Network Concepts...... 580 Reference 22.2 Networks in Action ...... 585 Reference 22.3 Basic Network Configuration...... 591 Exercise 22.1 Connect to a Wi-Fi Network ...... 597 Exercise 22.2 Monitor Network Connectivity...... 601

Lesson 23 Advanced Network Configuration...... 605 Reference 23.1 Network Locations...... 605 Reference 23.2 Network Interfaces and Protocols...... 608 Reference 23.3 Network Services ...... 613 Reference 23.4 VPN Configuration...... 617 Reference 23.5 Advanced Network Configuration...... 622 Exercise 23.1 Configure Network Locations ...... 631 Contents xiii

Exercise 23.2 Configure Network Service Order...... 639 Exercise 23.3 Configure VPN Settings...... 643 Exercise 23.4 Advanced Wi-Fi Configuration...... 647

Lesson 24 Network Troubleshooting...... 653 Reference 24.1 General Network Troubleshooting ...... 653 Reference 24.2 ...... 659 Exercise 24.1 Network Troubleshooting...... 665

Network Services

Lesson 25 Network Services...... 677 Reference 25.1 Network Services Architecture...... 677 Reference 25.2 Network Service Applications...... 679 Reference 25.3 File-Sharing Protocols...... 692 Reference 25.4 Connecting to File Shares...... 693 Reference 25.5 Network Service Troubleshooting...... 704 Exercise 25.1 Configure a Network Service Account...... 709 Exercise 25.2 Use File-Sharing Services ...... 717 Exercise 25.3 Troubleshoot Network Services...... 723

Lesson 26 Host Sharing and Personal Firewall...... 729 Reference 26.1 Host-Sharing Services...... 729 Reference 26.2 ...... 737 Reference 26.3 AirDrop...... 748 Reference 26.4 Personal Firewall...... 751 Reference 26.5 Shared Service Troubleshooting...... 756 Exercise 26.1 Use Host-Sharing Services ...... 758 Exercise 26.2 Configure the Personal Firewall...... 764

System Management

Lesson 27 Peripherals and Drivers...... 773 Reference 27.1 Peripheral Technologies...... 773 Reference 27.2 Bluetooth Devices...... 786 Reference 27.3 Peripheral Troubleshooting...... 790 Exercise 27.1 Examine Peripherals via System Information ...... 795 xiv Contents

Lesson 28 Print and Scan...... 799 Reference 28.1 Print System Architecture...... 799 Reference 28.2 Print and Scan Configuration...... 802 Sharing Printers ...... 810 Reference 28.3 Managing Print Jobs...... 812 Reference 28.4 Print System Troubleshooting ...... 821 Exercise 28.1 Configure Printing...... 823 Exercise 28.2 Manage Printing...... 829 Exercise 28.3 Troubleshoot the Printing System...... 836

Lesson 29 System Troubleshooting...... 839 Reference 29.1 System Initialization...... 840 Reference 29.2 User Session...... 847 Reference 29.3 Sleep Modes, Logout, and Shutdown ...... 850 Reference 29.4 Startup Shortcuts ...... 856 Reference 29.5 System Initialization Troubleshooting...... 858 Reference 29.6 User Session Troubleshooting...... 863 Exercise 29.1 Examine System Startup...... 864 Exercise 29.2 Use Single-User Mode...... 868

Index ...... 875

Appendix A Lesson Review Questions and Answers. . . . A-1 Appendix B Additional Resources ...... B-1

Bonus chapters mentioned in this eBook are available after the index. See last page of this eBook for instructions on downloading your lesson files. This page intentionally left blank

Lesson 4 OS X Recovery

From a troubleshooting viewpoint, one of the most useful OS X features is the OS X Recovery system. Via OS X Recov- GOALS ery, you can not only reinstall OS X but also access a variety of administration and troubleshooting utilities. OS X Recovery ▶▶ Access the utilities replaces functionality previously accessed via an OS X instal- available in OS X lation DVD. The primary difference is that the OS X Recovery Recovery system is, by default, located on the primary system disk. This allows easy “anytime” access to recovery utilities without the ▶▶ Reinstall OS X from need for additional media. OS X Recovery In this lesson, you will learn how to access OS X Recovery ▶▶ Create external both on new Mac computers that came with OS X prein- recovery disks stalled and on systems that were upgraded to OS X Maver- icks. You will also briefly explore the utilities available from OS X Recovery. As long as you don’t make any permanent changes using the utilities in OS X Recovery, you can safely explore without damaging your primary OS X system. Finally, you will learn how to create external OS X recovery disks that can be used in cases where the local Recovery HD system isn’t available.

Reference 4.1 Startup from OS X Recovery Mac systems running OS X Mavericks, including both systems that shipped with OS X Mavericks and upgraded systems, include a hidden OS X Recovery system on the local system disk. To access this copy of OS X Recovery, simply restart the computer while holding down Command-R. Once the OS X Recovery system fully starts, the OS X Utilities appears. From there you can install (or reinstall) OS X and choose from a variety of maintenance applications.

87 88 OS X Recovery

NOTE ▶ ​​​The OS X Recovery system partition, dubbed Recovery HD, is a hidden partition that does not appear by default when running OS X. The Recovery HD partition is automatically created out of the last 650 MB or so of the installation destination. You can verify the existence of the Recovery HD partition by examin- ing the internal disk using the System Information application. If for some reason OS X Recovery doesn’t start or isn’t installed on the local system disk, there are three alternatives for accessing it:

▶▶ If you have a Mac model released in mid-2010 or later—If your Mac computer has the latest firmware updates, it’s capable of accessing OS X Internet Recovery. If the local OS X Recovery system is missing, late-model Mac computers should automati- cally attempt to access OS X Internet Recovery. You can also force a system to start up to OS X Internet Recovery by holding down Command-Option-R. When your late- model Mac computer starts from OS X Internet recovery, it attempts to redownload the OS X Recovery system from Apple servers. If successful, this process re-creates the local Recovery HD partition.

MORE INFO ▶ ​​For more about using OS X Internet Recovery, see Apple Support article HT4718, “OS X: About OS X Recovery,” and article HT4904, “Computers that can be upgraded to use OS X Internet Recovery.”

▶▶ If you have an external OS X recovery disk—Connect the recovery disk to your Mac computer, and restart while holding down the . This opens Startup Manager, where you can use the Arrow and Return keys or the mouse and trackpad to select the OS X recovery disk. Reference section 4.3, “External OS X Recovery Disks,” covers this topic in greater detail. ▶▶ If you have a local Time Machine backup disk—The Time Machine backup service automatically creates a hidden OS X Recovery system on local backup disks. To access this system, connect the Time Machine backup disk to your Mac computer, and restart while holding down the Option key. This opens the Mac computer’s Startup Manager, where (as above) you can use the Arrow and Return keys or the mouse and trackpad to select the Time Machine backup disk. Lesson 18, “Time Machine,” covers this topic in greater detail.

Reference 4.2 OS X Recovery Utilities OS X Recovery is a useful administrative and troubleshooting resource. When you start up from this system, you have access to several system-administration and maintenance tools. Reference 4.2 OS X Recovery Utilities 89

This system even has a few utilities you cannot find anywhere else in OS X. Again, when you first start the OS X Recovery system, you are greeted with the OS X Utilities window.

NOTE ▶ When a Mac computer is started up from OS X Recovery, Ethernet and Wi-Fi networking is available if the network provides DHCP services. Ethernet is automatically enabled if physically connected. If a Wi-Fi network isn’t automatically connected, you can select a wireless network from the Wi-Fi menu item.

NOTE ▶ If manual network setup is required during use of OS X Recovery, refer to instructions in Apple Support article HT5034, “Using Lion Recovery when no DHCP service is available.”

NOTE ▶ While running from OS X Recovery, if the Mac computer’s system disk is protected by FileVault 2, any access to this disk first requires unlocking of the disk. In most cases, any local user’s password on the system should be allowed to unlock the system FileVault 2 drive. Lesson 11, “FileVault 2,” covers this topic in greater detail.

From the OS X Utilities window in OS X Recovery, you can access the following functions:

▶▶ Restore From Time Machine Backup—Use this to restore a full-system Time Machine backup from either a network or a locally connected disk. Lesson 18, “Time Machine,” covers this topic in greater detail. 90 OS X Recovery

▶▶ Install OS X or Reinstall OS X—As the name implies, this opens the OS X Installer. If you are running from an OS X Install disk, the disk contains all the OS X installation assets. However, the local hidden Recovery HD and disks created with OS X Recovery Disk Assistant do not contain the installation assets, and thus require Internet access to reinstall OS X. Further, the OS X Installer must verify that the user is allowed access to the OS X Mavericks assets. On older Mac computers that were upgraded to OS X Mavericks, you must verify the installation by providing the Apple ID used to purchase OS X. For Mac computers that shipped with OS X Mavericks, this verification is auto- matic. Lesson 2, “Install OS X Mavericks,” covers this topic in greater detail. ▶▶ Get Help Online—This opens , directed to the Apple Support website. ▶▶ —This application is responsible for storage-related administration and maintenance. It is especially useful when the Mac computer has started up from OS X Recovery, because Disk Utility can be used to manage a system disk that otherwise can’t be managed when in use as the startup disk. Specifically, Disk Utility can be used to pre- pare a disk for a new installation of OS X or to attempt repairs on a disk that fails instal- lation. Lesson 10, “File Systems and Storage,” covers this topic in greater detail. ▶▶ Startup Disk (by clicking the close button or quitting)—If you attempt to quit the OS X Utilities window, it will prompt you to start the Startup Disk utility. This utility will allow you to select the default system startup disk. The default startup disk can be overridden using any of the alternate startup modes discussed in Lesson 29, “System Troubleshooting.” Reference 4.3 External OS X Recovery Disks 91

Wait, there’s more. OS X Recovery has a few extra utilities hidden in the Utilities menu at the top of the screen:

▶▶ Firmware Password Utility—This utility allows you to secure the Mac computer’s startup process by disabling all alternate startup modes without a password. You can disable or enable this feature and define the required password. You can find out more about Firmware Password in Lesson 8, “System Security.” ▶▶ Network Utility—This is the primary network and Internet troubleshooting utility in OS X. Its primary use in OS X Recovery is to troubleshoot any network issues that could prevent the download of OS X installation assets. The Network utility is further discussed in Lesson 24, “Network Troubleshooting.” ▶▶ Terminal—This is your primary interface to the command-line environment of OS X. The most useful command you can enter from here is simply resetpassword, followed by the Return key. ▶▶ Reset Password opened via Terminal—This utility lets you reset the password of any local user account, including the root user, on the selected system disk. Obviously, this is a dangerous utility that can pose a serious security threat. Because of this, the Reset Password utility runs only from OS X Recovery. You can find out more about Reset Password in Lesson 8, “System Security.”

NOTE ▶ The utilities available from OS X Recovery can certainly be used to compro- mise system security. Then again, any system whose default startup disk can be overrid- den during startup is wide open to compromise. Therefore, in secured environments, it’s often necessary to use the Firmware Password utility to help protect your systems.

Reference 4.3 External OS X Recovery Disks In some cases, a Mac computer with OS X installed does not have a local Recovery HD. For example, if you just replaced the internal disk with a new disk, nothing will be on the new disk. Also, OS X systems on RAID sets and disks with nonstandard 92 OS X Recovery

partitioning will not have a local Recovery HD. In these cases, you would need to start up from an external OS X recovery disk. Also, having an external OS X recovery disk handy can be a real lifesaver should you come across a Mac computer with a dysfunctional sys- tem disk.

NOTE ▶ When creating your own OS X recovery disks, make sure to keep track of the specific version of OS X you are using. As covered in Lesson 2, “Install OS X Mavericks,” newer Mac systems do not support older versions of OS X and may require computer- specific builds of OS X. As such, you should always keep your OS X recovery disks updated to the latest versions of OS X available from the Mac App Store. Two do-it-yourself solutions exist to convert a standard disk into an OS X recovery disk. The first involves creating an OS X Recovery disk using the OS X Recovery Disk Assistant application. The second creates an OS X Install disk using the contents of the Install OS X Mavericks application.

▶▶ Create an OS X Recovery disk—The advantage to creating an OS X Recovery disk is that it requires only a 1 GB USB flash disk. This method is initiated through the OS X Recovery Disk Assistant application, available on the Apple support downloads website. This application simply copies the computer’s local Recovery HD system to an external disk. The downside to this method is that the resulting OS X Recovery disk will not contain the OS X installation assets. Thus, when running OS X Recovery from this disk, if you need to reinstall OS X, the system will have to download the OS X installation assets from the Internet. Exercise 4.2, “Create an OS X Recovery Disk,” outlines the steps necessary to create this type of disk. ▶▶ Create an OS X Install disk—The advantage to creating an OS X Install disk is that it will include the full OS X installation assets on the disk. This method involves using a special command-line tool, named createinstallmedia, found inside the Install OS X Mavericks application. This tool will copy both an OS X Recovery system and the full OS X installation assets to an external drive. The downside to this method is that it requires an 8 GB disk. Exercise 4.3, “Create an OS X Install Disk,” outlines the steps necessary to create this type of disk. Exercise 4.1 Use OS X Recovery 93

Exercise 4.1 Use OS X Recovery

▶ Prerequisite

▶▶ Your computer must have a local hidden Recovery HD partition. This partition is normally created by the OS X Mavericks installation process.

In this exercise, you will start up your computer in OS X Recovery. OS X Recovery is stored on a hidden partition named Recovery HD that is created automatically when OS X is installed on the hard disk. You will review the included utilities as well as how OS X Recovery can reinstall the system itself.

NOTE ▶ You will not perform an installation, but you will get an opportunity to look at the steps leading up to the installation.

Start Up Using OS X Recovery To access the Installer and other utilities in OS X Recovery, you need to start up from the hidden Recovery HD partition.

1 If your computer is on, shut it down by choosing Shut Down from the .

2 Press the power button on your computer, and then hold down Command-R until the gray Apple logo appears on the screen. When you hold down Command-R during startup, the computer attempts to start up using a recovery partition on the hard disk. If no recovery partition is available, Mac computers with newer firmware can actu- ally start up from an Apple server over the Internet and get access to the OS X Recovery features. If your computer starts up to the login screen instead of OS X Recovery, you may not have held Command-R long enough. If this happens, click the Shut Down button and try again. If your computer displays a globe icon with the text “Starting Internet Recovery. This may take a while,” your computer was unable to find a local Recovery partition. If the Recovery partition exists, you can shut down your computer by holding the 94 OS X Recovery

power button for 10 seconds, and then select the Recovery partition using the Startup Manager (see the instructions in Exercise 4.2, in the “Test the OS X Recovery Disk” section). If your computer does not have a Recovery partition, you can let it finish starting into Internet Recovery, and then proceed with this exercise. 3 If a language selection screen appears, select your preferred language, and click the right-arrow button.

4 After OS X Recovery starts up, you see a Mac OS X Utilities window. This window is the primary interface for OS X Recovery.

If you see a Welcome screen instead, you probably pressed Command-R too late or did not hold it down long enough. You can start over by pressing Command-Q and then clicking the Shut Down button.

Examine the Utilities Available in OS X Recovery While running OS X Recovery, you have access to some utilities for recovering, repairing, and reinstalling OS X. In this part of the exercise, you will familiarize yourself with some of these utilities.

NOTE ▶ While running from OS X Recovery, if the Mac computer’s system disk is protected by FileVault 2, any access to this disk will first require unlocking of the disk. In most cases, any local user’s password on the system should be allowed to unlock the system FileVault 2 drive. Lesson 11, “FileVault 2,” covers this topic in greater detail. Exercise 4.1 Use OS X Recovery 95

View Help for OS X Recovery You will use Safari to view the built-in instructions of OS X Recovery and to browse the web.

1 Select Get Help Online, and then click Continue. Safari opens and displays a document with information about how to use OS X Recovery. Take a moment to skim the document. This document is stored on the Recovery HD partition, but as long as you have an Internet connection available, you can also use Safari to view online documentation such as the Apple Support articles. 2 Click the Apple bookmark.

Safari displays the Apple website. 3 If Safari displays a message that says “You are not connected to the Internet,” you can join a wireless network using the Wi-Fi icon near the right side of the .

4 If you are prompted to unlock the Login keychain, leave the Password field blank, and click OK.

5 Click the Support link near the top right of the page. You are taken to the support section of the Apple site. If you were experiencing a problem with your computer, this would be a good place to look for solutions and information. You will use some of the Apple support resources later in this guide. 6 From the menu bar, choose Safari > Quit Safari (or press Command-Q) to return to the main utilities screen. Note that closing the Safari window does not actually quit Safari. This is common among Mac applications, but if you are accustomed to using Windows it may be contrary to your expectations. Generally, the best way to quit a Mac applica- tion is to choose Quit from the application menu (the menu to the Apple menu, named for the current application); or you can use the keyboard shortcut Command-Q. 96 OS X Recovery

Examine Disk Utility Disk Utility is provided in OS X Recovery to allow you to repair, image, reformat, or repartition your computer’s disk.

1 Select Disk Utility, and then click Continue. In the Device List on the left, you will see your disk device and a Mac OS X Base Sys- tem disk image. Note the primary entry for each physical disk device and an indented list of volumes on each device (discussed in more detail in Lesson 10, “File Systems and Storage”). 2 Select the entry that represents your startup volume. Typically, it is named Macintosh HD. Notice the options available to perform on the volume: First Aid, Erase, RAID, and Restore. Among the reasons Disk Utility is provided in OS X Recovery is to allow you to verify or repair the startup volume’s file structure, or if necessary to erase the volume before reinstalling OS X.

3 Select the entry that represents your disk (just above the startup volume). Notice that the Partition option is now available. 4 Quit Disk Utility by choosing Disk Utility > Quit Disk Utility or by pressing Command-Q. You are returned to the main utilities screen. Exercise 4.1 Use OS X Recovery 97

Examine Time Machine Restoration If you backed up your computer with Time Machine, OS X Recovery has the capability to do a full system restoration from that backup. Setting up Time Machine is covered in Lesson 17, “File Archives.”

1 Select Restore From Time Machine Backup, and then click Continue. A page of on the restoration process appears. It is important to note that this restoration interface will erase all current data and replace it from the backup; other restoration interfaces that let you control which files or folders are restored are examined later. 2 Click Continue. The “Select a Backup Source” screen appears. If you had configured a Time Machine backup target, it would be available here as a source for restoring your system. Time Machine is discussed in more detail in Lesson 18, “Time Machine.” 3 Click Go Back to return to the Restore Your System screen.

4 Click Go Back again to return to the main utilities screen.

Examine the OS X Installer Now you will examine the reinstallation process, but you will not perform the installation. By going through the following steps, you can experience the configuration of an installa- tion without actually waiting for the OS X software to be copied to your system.

1 Select Reinstall OS X, and then click Continue. The OS X Mavericks opens. 2 Click Continue. A dialog appears indicating that this computer’s eligibility will be verified with Apple. 3 Click Continue.

4 At the license agreement, click Agree.

5 In the license confirmation dialog, click Agree again. The OS X installer displays a list of partitions where you could install or reinstall OS X. 98 OS X Recovery

NOTE ▶ Do not click the Install button; otherwise the Installer reinstalls OS X, which you do not want to do at this time.

6 Quit the Installer.

Verify Your Startup Disk and Restart The Startup Disk utility allows you to select the volume from which to start up. If you are having problems during system startup from your computer’s internal disk, you could connect a second disk with OS X installed, and use Startup Disk to configure the com- puter to start up from the new disk.

1 From the Apple menu, choose Startup Disk. Notice that Startup Disk shows you a list of all startup volumes. Available options may include Network Startup or one or more NetBoot images, depending on what Startup Disk finds on your network.

2 Verify that your computer’s normal startup volume (typically named Macintosh HD) is selected; if necessary, select it.

3 Click Restart.

4 In the confirmation dialog, click Restart. You could also restart without using the Startup Disk utility by choosing Apple menu > Restart. Exercise 4.2 Create an OS X Recovery Disk 99

Exercise 4.2 Create an OS X Recovery Disk

▶ Prerequisites

▶▶ Your computer must have a local hidden Recovery HD partition.

▶▶ You need an erasable external disk with a capacity of at least 1 GB.

▶▶ You must have created the Local Admin account (Exercise 3.1 or 3.2).

The OS X Recovery partition can help you recover from many problems that might other­ wise render your computer unusable, but there are a few issues it cannot help with. For instance, anything that renders the computer’s startup disk unreadable, such as a damaged partition table or even complete disk failure, will also prevent the Recovery HD partition from being used. This exercise will explore another option: You can copy OS X Recovery onto an external disk, such as a USB flash disk, for use in case of emergency.

NOTE ▶ You must run Recovery Disk Assistant from a Mac system that contains a local hidden OS X Recovery HD.

Download Recovery Disk Assistant The following steps walk you through searching the Apple support resources for OS X Recovery Disk Assistant, and downloading it.

1 If necessary, log in as Local Admin (password: ladminpw, or whatever you chose when you created the account).

2 Open Safari. Note the shortcut for it in your Dock.

3 If you are not automatically taken to the Apple website, click the Apple shortcut in the Safari bookmark bar. 100 OS X Recovery

4 Click the Support link near the top right of the Apple webpage. The support section of the Apple website includes a wide variety of resources, including software downloads, manuals and specifications, the Apple Support documents, and links to warranty and repair information. 5 In the search field to the right of the Support link (not the search field in the Safari toolbar), enter recovery disk assistant, and press Return.

The search results page has a number of options to change and refine your search, but you should not need these here; one of the first search results should be a download page (indicated by a down-arrow icon) for OS X Recovery Disk Assistant.

6 Click the link for OS X Recovery Disk Assistant v1.0.

7 Click the Download button. While it downloads, take a moment to skim the information in the download page. Note that it includes a summary of what the program is and how to use it, as well as its version, system requirements, and a list of supported languages. 8 When the download is complete, quit Safari by choosing File > Quit or pressing Command-Q.

Reformat the External Disk Most external disks come preformatted with the MBR partition scheme; in order to allow an Intel Mac computer to start up from it, you must reformat this disk with the GUID Partition Table (GPT) partition scheme. Disk formats are discussed in more detail in Lesson 10, “File Systems and Storage.”

WARNING ▶ This operation will erase all information on the external disk. Do not perform this exercise with a disk that contains any files you want to keep. Exercise 4.2 Create an OS X Recovery Disk 101

1 Open Disk Utility. It is located in the Utilities folder, which is inside the Applications folder. You can navigate to this folder in the ; use the Finder shortcut Com- mand-Shift-U; or open Launchpad from the Dock, and then select the Other icon in Launchpad.

2 Plug the external disk in to your computer.

3 If you are prompted for a password to unlock the disk, the disk is encrypted, and cannot be used for this exercise. If this happens, eject the disk, and use a different disk for the exercise.

4 Select the external disk device entry in the Disk Utility sidebar. Be sure to select the device entry, not the volume entry indented beneath it.

5 Check the Partition Map Scheme listed at the bottom of the window. Depending on what this disk was used for most recently, the partition scheme could be anything. In order to convert it to the GPT scheme, you will erase the disk. If it is already using the GPT scheme, this is not strictly necessary, but you should erase it just to be sure. 102 OS X Recovery

It is also possible to partition the disk, and use only part of it for OS X Recovery. The download page has a link to more information about OS X Recovery Disk Assistant, including the partitioning procedure. 6 Click the Erase .

7 Choose Mac OS Extended (Journaled) from the Format pop-up menu.

If you are preparing to create a Recovery disk, you do not need to change its name from Untitled; however, if you are preparing to create an Install disk (Exercise 4.3), you should give it a descriptive name. 8 Click the Erase button near the bottom right of the window.

9 In the confirmation dialog, click Erase.

10 Verify that the Partition Map Scheme is now listed as GUID Partition Table.

Since you erased the entire disk, rather than a single volume within the disk, Disk Utility has rebuilt the partition map as well. Although a Mac OS Extended volume can be created under any supported partition scheme, Disk Utility created a GUID Parti- tion Table because it is the best fit. 11 Quit Disk Utility. Exercise 4.2 Create an OS X Recovery Disk 103

Create an OS X Recovery Disk

1 Near the right of the Dock is a shortcut for your Downloads folder. Click it once to show its contents.

2 Click RecoveryDiskAssistant.dmg to open it. The disk image opens, revealing its contents—the Recovery Disk Assistant application. 3 Open the Utilities folder by choosing Go > Utilities or pressing Command-Shift-U. A new Finder window opens, and the contents of the Utilities folder appears. 4 Drag the Recovery Disk Assistant application to the Utilities folder.

5 A warning dialog appears. Click Authenticate, and then enter the password for the Local Admin (ladminpw, or whatever you chose when you created the account).

6 Once the copy is complete, double-click the Recovery Disk Assistant in the Utilities folder. Since this application was downloaded from the Internet, a warning dialog opens providing information about where the application came from. Since malware is sometimes distributed via web download, this warning gives you a chance to decide if you can really trust this software before running it. This feature is discussed in 104 OS X Recovery

more detail in Lesson 19, “Application Installation.” As this application was down- loaded directly from the Apple website, you can go ahead and trust it.

7 Click Open.

8 In the license agreement pane, click Agree.

9 Select the icon for your external disk, and click Continue.

10 Authenticate as Local Admin when prompted. The creation process takes a few minutes. 11 When the process completes, click Quit. Exercise 4.2 Create an OS X Recovery Disk 105

Test the OS X Recovery Disk

1 From the Apple menu, choose Restart.

2 In the confirmation dialog, click Restart.

3 Hold down the Option key as the computer restarts. Keep holding it until a row of icons appears across the screen. This is the Startup Manager, in which you can choose which volume to start up from. You will see your regular startup volume (typically Macintosh HD) and two volumes both named Recovery-10.9—one with a disk icon and one with a USB, FireWire, or icon. Since both your external disk and your computer’s internal disk now have valid, up-to-date Recovery-10.9 volumes, you could access OS X Recovery with either one of them.

4 You may now either enter OS X Recovery, or restart your computer normally: ▶▶ If you have not used OS X Recovery before, you can select the Recovery drive, and then click the up-arrow button that appears below it. Then, follow the instructions in Exercise 4.1 to explore the features of OS X Recovery. ▶▶ If you have already completed Exercise 4.1, then you have already experienced OS X Recovery, and you can start up from your normal startup volume instead. Unplug the external disk, select the Macintosh HD icon, and then click the up- arrow button below it. 106 OS X Recovery

Exercise 4.3 Create an OS X Install Disk

▶ Prerequisites

▶▶ You need an erasable external disk with a capacity of at least 8 GB.

▶▶ You must have created the Local Admin account (Exercise 3.1 or 3.2).

In this exercise, you will create an OS X Install disk, which not only includes the OS X Recovery environment and tools, but also a full set of installation assets. With a disk cre- ated by this method, you can reinstall OS X Mavericks without needing to redownload the installer application from the Internet.

NOTE ▶ When creating your own OS X Install disk, make sure to keep track of the specific version of OS X you are using. As covered in Lesson 2, “Install OS X Mavericks,” newer Mac systems do not support older versions of OS X, and may require computer-specific builds of OS X. As such, you should always keep your OS X Install disks updated to the latest versions of OS X available from the Mac App Store.

Acquire a Copy of the Install OS X Mavericks Application If you upgraded to OS X Mavericks following the instructions in Exercise 2.2 and saved a copy of the installer application, you may use it and skip this section. If you are performing these exercises as part of a class, the instructor may have provided a copy in the Student- Materials folder. Otherwise, you can redownload the installer with the following procedure:

1 From the Apple menu, choose App Store. Note that the Mac App Store is discussed in more detail in Lesson 19, “Application Installation.”

2 In the search field of the App Store window, enter Mavericks and press Return. Exercise 4.3 Create an OS X Install Disk 107

3 Find OS X Mavericks in the search results, and click the “DOWNLOAD” button under its name.

4 Click Continue in the confirmation dialog that appears, then wait as it downloads.

When it finishes downloading, the installer application will open automatically. 5 Quit both Install OS X Mavericks and the App Store.

Reformat the External Disk Follow the instructions in the “Reformat the External Disk” section of Exercise 4.2, giving the disk a descriptive name (such as “Install Mavericks v10.9.0”) between steps 7 and 8. 108 OS X Recovery

Create an OS X Install Disk

1 Open Terminal from the Utilities folder.

2 Switch to the Finder, and open the Applications folder. You can do this by choosing Go > Applications, or with the keyboard shortcut Command-Shift-A.

3 Control-click the Install OS X Mavericks application, and choose Show Package Contents from the shortcut menu that appears. Packages are discussed in Lesson 14, Reference section 14.2. 4 Inside the installer package, open the Contents folder, and then open the Resources folder inside that.

5 Drag the file named createinstallmedia from the Finder window into the Terminal window.

This inserts the full path to createinstallmedia into Terminal. 6 Switch back to Terminal, and press Return.

This executes createinstallmedia as a command-line program. It prints a usage summary, explaining how to use the program.

7 Begin another command by typing “sudo ” (note that there must be a space at the end), but do not press Return until step 13.

8 Drag createinstallmedia from the Finder window into the Terminal window again.

9 In Terminal, enter the text “--volume ” (note that there are two dashes at the begin- ning, and a space at the end).

10 Drag the “Install Mavericks” (or whatever you named it) volume icon from the desk- top to the Terminal window.

11 In Terminal, enter the text “--applicationpath ” (again, there are two dashes at the beginning, and a space at the end).

12 In the Finder, navigate back to the Applications folder, and drag the Install OS X Mavericks application to the Terminal window. At this point, the Terminal command should look something like this (although the lines may wrap at a different point): Exercise 4.3 Create an OS X Install Disk 109

13 Switch to Terminal, and press Return. This operation requires admin access, so it prompts for your password.

14 Enter the Local Administrator account’s password (ladminpw, or whatever you chose when you created the account), and then press Return. Note that nothing displays as you type.

15 Since this operation will erase the disk, you are prompted to confirm the operation. Verify that the volume name (listed after “/Volumes/”) is the one you intend to use, and then enter “Y,” and press Return.

16 Wait as the Install disk is prepared. This may take several minutes.

When the process is complete, it prints “Copy complete.”, followed by “Done.” 17 Quit Terminal.

Test the OS X Install Disk Follow the instructions in the “Test the OS X Recovery Disk” section of Exercise 4.2, but note that the disk will have the name you gave it in the previous section. This page intentionally left blank Index

Numbers About This Mac dialog ACLs (access control lists), 3-Pass Erase, 245 configuring OS X 295–297 6 to 4 support, 612 Mavericks and, ACSP (Apple Certified 7-Pass Erase, 245 60–61, 84 Support Professional) 32-bit mode in System certification, 7–8 64-bit mode vs., Information, 329 ACTCs (Apple 536–538 Access Certified Technical Dashboard in, 560 Keychain Access for. see Coordinators), 8 opening apps in, Keychain Access Activity Monitor 566–567 No Access vs., 296, 304 in application support for 64-bit mode parental control of. see management, and, 535 Parental Controls 539–542 64-bit mode permissions for. see forcibly quitting 32-bit mode vs., 536–538 permissions applications in, 544, Dashboard in, 557, 560 preferences for. see 564–566 support for 32-bit mode Accessibility in, 846–850, and, 535 preferences 865–868 128-bit AES encryption, 411. to Web, 638, 673 Memory tab in, 541 see also encryption Access control entries opening apps in 32-bit 802.1X protocol (ACEs), 297 mode in, 566 authentication via, Access control lists (ACLs), opening apps in, 594–595 295–297 generally, 566–567 network configuration Accessibility preferences PID in, 865–868 and, 626–627 in application quitting apps in, 564–566 securing Ethernet management, restoring Preview networks via, 613 552–553 preferences in, in Privacy settings, 191 570–571 A Account passwords, defined, Ad hoc messaging, 692 AATCs (Apple Authorized 178. see also passwords Address Book. see Training Centers), 5, 7 ACEs (access control Address Resolution Protocol entries), 297 (ARP), 586–587

875 876 Index

Addresses AirDisk, 390 limiting access in, ARP for, 586–587 AirDrop 451–452 Ethernet, 581 architecture of, 748–749 managing Apple IDs IP. see introduction to, 597, 748 in, 449 (IP) addresses using between Mac purchase history in, 476 MAC, 581–582, 585–586 computers, 749–751 purchase management in, router, 583–584 AirPrint, 803 449–451 self-signed, 658 Aliases, 355, 357–358 reinstalling apps in, 486 Administrator accounts. Alternate systems, 857 removing installed apps see also Local Admin Analog stereo audio from, 466–467 creating new, 66–68 connections, 784 requirements in, 442–443 introduction to, 131 Anywhere option, 462–463 sandboxed applications resetting passwords in, AOL Instant Messenger from, 368 199–201 (AIM), 691 searching in, 444 security of, 176 APM (), security of apps in, 458 troubleshooting, 872–874 237–238 selecting apps from, Adobe Portable Document App Nap, 535 467–471 Format (PDF). see App Store standard accounts in, PDF (Portable Document account management in, 130–131 Format) 446–449 testing apps in, 475–476 Advanced configurations application sandboxing updating Apple IDs in, for firewalls, 753–755 in, 459 447–448 in Installer, 119–120 automatic updates from, up-to-date software for networks, 605, 112–117, 124–126 from, 466 622–631 browsing in, 443 verifying Apple IDs for printing, 807 compatible apps in, 491 in, 449 for security, 188 creating new, 474–475 Apple for Wi-Fi, 625–626, creating new Apple IDs AppleCare, 279 647–651 in, 448 AppleDouble, Advanced Technology downloading Installer 385–386, 708 Attachment (ATA), 329, from, 36–37 CUPS by. see CUPS 782–783 existing Apple IDs in, (Common UNIX AFP () 471–472 Printing System) browsing to, 694–695 Featured view of, 443 file-sharing protocol by. connecting to, 697–699 Gatekeeper in, 462 see Apple Filing definition of, 692 iCloud accounts in, Protocol (AFP) manually connecting to, 473–474 FileVault 2 by. see 721–723 installing Apple IDs FileVault 2 overview of, 731 in, 447 IDs. see Apple IDs version 2, issues with, 708 installing apps from, IDs at App Store. see Agents, 534 441–446 Apple IDs at AIM (AOL Instant introduction to, 23–24 App Store Messenger), 691 Index 877

Java SE 6 from, 455 for iCloud accounts, App Store account Macs by. see Macintosh 148–150 management in, computers iCloud Keychain 446–449 Migration Assistant authentication App Store for, generally, by. see Migration of, 222 441–442, 445–446 Assistant linking to existing iCloud App Store requirements Partition Map by, accounts with, in, 442–443 237–238 147–148 application sandboxing Remote Desktop by, 738, for new user accounts, in, 458–459 746–748 146–147 browsing App Store passwords and, 178, 182 in, 443 Agreements, 111 resetting passwords with, code signing in, 459 software updates by. see 201–203 creating new Apple IDs software updates for security, generally, 178 at App Store in, 448, store of. see Mac in Setup Assistant, 474–475 App Store 49–50, 136 Dead End app in, Support articles by, Apple IDs at App Store 481–482 generally, 4–5, 20 creating new, 448, drag-and-drop installs Time Machine by. see 474–475 for, 480–483 Time Machine existing, 471–472 environments of apps Training and installing, 447 and, 452–457 Certification by, 7–8 introduction to, 111 using existing Apple IDs Wireless Diagnostics by, managing, 449 at App Store in, 656–658 requirement for, 442, 471–472 Apple Authorized Training 445–447 file quarantine in, Centers (AATCs), 5, 7 updating, 447–448 459–461 Apple Certified Support verifying, 449 Gatekeeper in, 461–463, Professional (ACSP) Apple Partition Map (APM), 482–484 certification, 7–8 237–238 installation packages Apple Certified Technical for, 465 Coordinators (ACTCs), 8 (ARD), 738, 746–748 installer packages for, Apple Filing Protocol (AFP) AppleCare, 279 477–480 browsing to, 694–695 AppleDouble installing Apple IDs connecting to, 697–699 issues in, 708 in, 447 definition of, 692 for metadata, 385–386 introduction to, 441 manually connecting to, Application contention, 141 Java apps in, 454–456 721–723 Application installation. Java SE 6 from Apple overview of, 731 see also application in, 455 version 2, issues with, 708 management Java SE 7 from Oracle in, Apple IDs using iCloud accounts 455–456 at App Store. see Apple at App Store in, legacy Mac apps in, 454 IDs at App Store 473–474 878 Index

limiting access to App updating Apple IDs in, forcibly quitting Store in, 451–452 447–448 applications, 562 Mainserver for, 480–481 updating installed installing apps in. managing Apple IDs software in, 466 see application in, 449 verifying Apple IDs installation native OS X apps in, in, 449 introduction to, 533 453–454 viewing installed apps in, memory management in, open source software 484–485 535–536 in, 457 X Window System apps monitoring apps in, process security in, 458 in, 456–457 538–541 purchase history of apps Application management OS X process features for, 476 32-bit mode in, 535–538, in, 534 purchase management of 566–567 OS X process types in, apps for, 449–451 64-bit mode in, 535–538 534–536 reinstalling apps in App Accessibility preferences performance features in, Store in, 486 in, 552–553 534–535 removing apps for, Activity Monitor in, power management generally, 484–487 generally, 539–542 in, 535 removing apps in Activity Monitor in, preemptive multitasking Finder, 486 opening apps, in, 534 removing apps in 566–567 processes in, generally, Launchpad, 485–486 Activity Monitor in, 533–538 removing apps with quitting apps, processes in, monitoring, uninstallers, 487 564–566 538–541 removing installed agents in, 534 protected memory in, 535 software in, 466–467 applications defined secure memory allocation searching App Store in, 534 in, 536 in, 444 assistive technologies for, in, security in drag-and-drop 552–557 555–556 apps, 463 commands defined symmetric security in Gatekeeper in, in, 534 multiprocessing in, 482–484 commands in, 534–535 security of apps in, defined, 534 System Information generally, 458–463 compressed memory in, 538 selecting apps from App in, 536 troubleshooting in. see Store in, 467–471 daemons in, 534 troubleshooting StudentMaterials for, 481 Dashboard for, 557–561 applications testing apps from App Dictation in, 556–557 viewing systems Store in, 475–476 dynamic memory processes/usage, 567 traditional methods for, allocation in, 535 VoiceOver in, 553–554 463–466 Force Quit windows, 563 widgets in, adding, UNIX apps in, 454 558–559 Index 879

widgets in, Dashboard disk images, mounting, Automatic authentication, 695 and, 560 404–405 Automatic document widgets in, manually disk images, options behaviors, 528–531 managing, 559 for, 405 Automatic mounting network widgets in, introduction to, 401 shares troubleshooting, zip, creating, 402–403 in file-sharing 560–561 zip, expanding, 403–404 services, 720 Application registration, 491 zip vs. disk images, 402 mounted shares, 703–704 Application sandbox ARD (Apple Remote Automatic network containers Desktop), 738, 746–748 locations, 606 installation of, 458–459 ARP (Address Resolution Automatic resume, 511–513 in system resources, Protocol), 586–587 Automatic software updates. 368–369 ATA (Advanced Technology see also software updates Application support, 365 Attachment), 329, from App Store, 113–115, Applications folders, 159, 364 782–783. see also Serial 124–126 Architecture ATA (SATA) behavior of updates in, of AirDrop, 748–749 Audio 112–113 of documents in iCloud, compressed, 490 checking installation 510–511 connectivity of, 784 of, 126 of network services, devices for, 791 introduction to, 111–112 677–679 Authentication preferences for, of printer systems, automatic, 695 115–117, 124 799–802 duplicating files and, 171 for third-party of Screen Sharing, in iCloud Keychain, software, 466 738–739 222–225 Automatic wake, 730. see also of Time Machine, manual, 696–697 sleep modes 413–418 Time Machine and, 422 of Versions, 496–497 Auto Save B Archive Utility, 404 disabling, 513 Backing up data Archives in document in files/folders, 19 comparison of, 401–402 management, installing OS X Mavericks disk image archives, 518–521 and, 19, 35 creating, 408–409 Duplicate in, 499–501 Time Machine for. see disk images, creating iCloud documents Time Machine empty, 406–408 and, 508 Backup volumes, 431–432 disk images, creating locking documents and, Basic printing, 812–813. see generally, 409–410 504–505 also printing disk images, creating with Save As in, 499–501 Beach-balling, 543 Disk Utility, 410–412 turning off, 531 Behaviors disk images, Versions architecture and, of documents, 528–531 generally, 404 496–497 of software updates, AutoFill, 215–216 112–113 880 Index

in System Preferences, Bootstrap Protocol Cfprefsd, 549, 570–571 528–530 (BOOTP), 590 CIDR (Classless in TextEdit, 528–530 Breaking network settings, Interdomain Routing), Binary-encoded files, 549–550 665–666 583, 636 Bluetooth Broken DNS, 665–674. see Cisco IPSec, 620 discoverable mode in, also DNS (Domain Classic compatibility 786–787 Name System) environments, 454 introduction to, 609 Buddy lists, 744 Classless Interdomain managing settings in, Bundles, 352–354 Routing (CIDR), 788–789 Burn Folder, 355 583, 636 pairing devices in, Buses, 775. see also USBs Clean installations, 25 786–788 (Universal Serial Buses) Cocoa, 453–454 peripherals in, 780–781, Buy App, 445 Code signing, 459, 752 786–789 Command, defined, 534 personal area network C Command-Option-D startup in, 610 C startup shortcut, 857 shortcut, 857 printers in, 805 Cache files, 543 Command-Option-P-R sharing services via, 732 CalDAV collaborative startup shortcut, 858 calendaring, 686 Command-Option-R startup discovery protocols shortcut, 857 in, 734 collaboration in, 686 Command-R startup DNS and, 589 Internet Accounts shortcut, 857 DVD/CD sharing in, 731 preferences for, Command-S startup Message and, 692 680–682 shortcut, 858 names in, 735–737 overview of, 686–687 Command-V startup for printing, 803, 806, publishing in, 687 shortcut, 858 823–828 Cameras, 790–791 Comments, 393–396 Boot Camp, 842 Carbon, 453–454 Common UNIX Printing Boot read-only memory Cards, defined, 781 System (CUPS) (BootROM), 841. see CAs (certification drivers in, 800–802 also firmware authorities), 478 for printing, 836–837 Booter Case-sensitive Mac OS in printing architecture, introduction to, 840 Extended volumes, 799–800 in system initialization, 238–239 Communication, 678 842–844 CDFS (Compact Disk File Compact Disk File System in system System), 240 (CDFS), 240 troubleshooting, 860 CDs (compact disks), Compact disks (CDs), BOOTP (Bootstrap 730–731 730–731 Protocol), 590 Cellular Internet connections, CompactFlash cards., 235 BootROM (boot read-only 610–611 Compatibility, 18–19 memory), 841. see Certification authorities Composite video also firmware (CAs), 478 connections, 784 Index 881

Compression Finder Preferences in, text document creation of archives. see 69–71 in, 261 zip archives iCloud in, 49–50 viewing diagnostic of audio files, 490 iCloud Keychain in, 52 reports in, 573–574 of memory, 536 installing Configuration Contacts of statistics, 541 Profile for, 81–83 deleting, 434–435 Computer names, 71–73, keyboards in, 48 importing vCards into, 735–737 Migration Assistant for, 433–434 Confidential Watermark, 52–54 Internet Accounts 834–835 Mouse preferences in, preferences for, Configuration 73–74 680–682 of existing OS X systems, network settings in, 49 in network services, 66–68 Profiles in, 58–59 generally, 687–689 of network services, registering a Mac in, 52 restoring, 435–436 680–683, 709–716 setting computer names searching in, 386 of networks. see network in, 71–73 testing new accounts configuration Setup Assistant for, 47–52 in, 715 of new OS X systems, System Information for, viewing existing accounts 63–66 60–63, 84 in, 709–710 of OS X Mavericks. see System Preferences for, Container folders, 369 configuring OS X 55–57, 69–74 Contention issues, 141 Mavericks Terms and Conditions Cookies, 192 of personal firewalls, in, 50 Copper Thunderbolt 764–770 Trackpad preferences in, cabling, 779 of printing, 802–809, 73–74 Corrupted preferences, 823–828 transfer information in, 548–549 of Time Machine, 418– 49 Countries, 48 423 Connection Doctor, 706–707, view, 494 Configuring OS X Mavericks 724–726 CPU utilization, 539–541, About This Mac dialog Connectivity 564–565 in, 60–61, 84 Ethernet. see Ethernet Crashes, 545–546, 574–576 Apple IDs in, 49–50 of networks, 601–604 Create Your Computer countries in, 48 of peripherals, 774–775, Account, 51 Create Your Computer 784–785 Credit card purchases, Account in, 51 troubleshooting, 757 447–448 downloading student wireless. see wireless CUPS (Common UNIX materials in connectivity Printing System) classrooms, 74–77 Console drivers in, 800–802 downloading student CUPS logs in, 836–837 for printing, 836–837 materials ejecting volumes in, in printing architecture, independently, 262–264 799–800 78–80 firewall logs in, 768 Custom search queries, Mac feature in, search queries in, 574–576 574–576 50–51 882 Index

D troubleshooting, 658 Disk Utility D startup shortcut, 857 turning off, 632 adding volumes in, 244 Daemons, 534 Diagnostic reports creating disk images Darwin, 454, 457 in Console, 545–546 in, 402 Dashboard examining, 573–576 decrypting disks 32-bit vs. 64-bit modes Network, 659, 669–672 with, 249 in, 537–538 for troubleshooting, deleting volumes in, 244 for application generally, 545 disk image archive management, Wireless, 656–658 creation in, 408 557–561 Diagnostics & Usage, 192 disk image creation in, Data recovery, 324–325. see Dictation & Speech, 556–557 406–407 also Recovery Digital cameras, 790–791 disk image options Date & Time, 188 Digital Subscriber Line in, 405 Dead End (DSL), 612 ejecting volumes in, in 32-bit mode in, Digital Video Interface 261–264 566–567 (DVI), 785 encrypting volumes in, in Activity Monitor, Directly attached printers, 265–268 564–567 802–803 Erase in, 41–43 in Dock, 562 Directory services, 757 erasing and partitioning downloading, 480–484 , 176 disks in, 256–260 forcibly quitting, 562–566 Discoverable mode, 786–787 erasing destination installation of, 481–482 Disk images system disk with, 25 Default behaviors, 528–530 creating archives, erasing disks/volumes in, Default permissions, 408–409 244–246 309–313 creating empty, erasing files in, 246–247 Delete (–) button, 307 406–408 erasing free space on Desktop folders, 158 creating generally, volumes in, 269–270 Destinations for OS X 409–410 erasing volumes in, Mavericks, 25–26 creating with Disk Utility, 270–271 Detailed printing, 814–816 410–412 formatting disks in, Device classes, 790–791 downloading apps 241–242 DHCP (Dynamic Host from, 465 introduction to, 21, 240 Configuration Protocol) introduction to, Macintosh HD in, introduction to, 589–590 401–402, 404 286–287 IPv4 addresses and, 590 keychains in, 228–231 mount management network configuration mounting, 404–405 options in, 251–252 and, 632 options for, 405 nonstarting systems network locations in, restoring accounts in, and, 324 633–635 169–171 for OS X Recovery, 96 Network Setup Assistant saving home folders in, OS X Recovery and, 90 and, 592 160, 168–169 Partition Layout in, TCP/IP and, 612 zip archives vs., 402 242–244 Index 883

partition schemes in, .doc for Microsoft Word resume after log out 257–260 files, 490 in, 512 recovering data via, 324 Dock resume after quit in, reformatting disks in, App Store in, 443 512–513 241–242 forcibly quitting storing in iCloud, reformatting external applications in, 544 523–527 disks in, 100–102 print queues in, 813, troubleshooting, 542 Repair Disk Permissions 818–820, 832–833 turning off Auto Save in, 326–327 shared items in, 703 in, 531 repairing partitions/ testing apps in, 475 unlocking documents in, volumes in, 321, Time Machine icon 522–523 337–338, 342–344 in, 424 Versions in, 496–503, repairing system file Dock process, 560–561 518–521 permissions in, Document management Documents & Data, 340–341, 344–345 alternate applications for, 506–507, 526 repartitioning disks in, 514–518 Documents folders, 158 generally, 242–244 application registration (DNS) repartitioning startup in, 491 Broken, 665–674 disks in, 254–256 Auto Save in, 496–503, Dynamic, 617 resizing volumes in, 243 518–521 host names in, 735 secure erase options automatic behaviors in, introduction to, in, 247 528–531 587–589 starting target computers automatic resume in, multicast, 11 and, 335 511–513 in network services, storage inspection with, default behaviors in, 678–679 318–319 528–529 support for, 612 Verify and Repair disabling Auto Save TCP/IP and, 584 features in, 321–322 in, 513 troubleshooting, 672–673 viewing disk information fast user switching in, 141 Downloading student in, 331–334 file type defaults in, materials DisplayPort, 778–780 516–518 in classrooms, 74–77 DNS (Domain Name System) file type identification in, independently, 78–80 Broken, 665–674 490–491 Downloads folders, 158 Dynamic, 617 in iCloud, 506–511, Drag-and-drop host names in, 735 523–527 for application introduction to, 587–589 introduction to, 489 installation, 480–483 multicast, 11 Launch Services in, security in, 463 in network services, 489–493 to Trash, 467 678–679 locking documents in, Drivers support for, 612 503–506, 521–522 for peripherals, 792–793 TCP/IP and, 584 Open With feature in, for printers, 800–802, 808 troubleshooting, 672–673 515–516 technologies for, Quick Look in, 493–496 generally, 773 884 Index

DriveSavers, 317 of in-use volumes, disk data, 268–271 Drop Box permissions, 296, 252–253 disks, 244–246, 256–260 302, 313–314 as user, 263–264 Erase Free Space for, DSL (Digital Subscriber of volumes, 261–264 269–270 Line), 612 Email invitations, 687. see files, 246–247 Dual-Link DVI also Mail Mac systems, 40–45 (DVI-DL), 785 Encrypted Mac OS Extended repartitioning disks and, DVDs, 730–731 volume format, 238–239 256–260 DVI (Digital Video Encryption security in, 268–271 Interface), 785 128-bit AES, 411 Single-Pass Erase, 245 DVI-DL (Dual-Link in disk images, 405, space on volumes, DVI), 785 407, 409 268–270 Dynamic DNS, 617. see of disks, 247–249 volumes, 244–246 also DNS (Domain FileVault 2 for, 189, 194, Ethernet Name System) 277–278 addresses, 581 Dynamic Host Configuration full disk, 189, 194, hardware options, 613 Protocol (DHCP) 270–271 introduction to, 609 introduction to, 589–590 in Legacy FileVault, in network configuration, IPv4 addresses and, 590 189–190 630–631 network configuration on Mac HD volumes, Point-to-Point Protocol and, 632 290–291 over, 612 network locations in, of system volumes, troubleshooting 633–635 277–278 connectivity of, Network Setup Assistant of Time Machine 655–656 and, 592 backups, Everyone settings, 295, 304 TCP/IP and, 612 418–419, 421 EWS (Exchange Web troubleshooting, 658 of volumes, 264–268 Services), 685 turning off, 632 XTS-AES 128, 273 Exchange Web Services Dynamic memory Energy Saver (EWS), 685 allocation, 535 configuration of, 81–83 Exchange-based services, Dynamic service Power Nap mode in, 854 685, 687 discovery, 733 Sharing preferences Exclusions, for Time Machine, and, 730 429–431 E sleep mode in, 852 ExFAT (Extended File Editing preferences, 549–551 Enhanced Dictation, 556–557 Allocation Table), 239 EFI (Extensible Firmware Environments of apps, Expansion buses, 781–782 Interface), 841–842 452–457 ExpressCard, 782 Ejection Environments of user Extended File Allocation of disks, 250–251, sessions, 850 Table (ExFAT), 239 260–264 Erasing Extended metadata attributes, Eject key for, 858 3-Pass Erase, 245 382–383 troubleshooting, 253–254 7-Pass Erase, 245 Index 885

Extensible Firmware Interface File archives. see archives SMB, copying files to, 719 (EFI), 841–842 File flags, 382–383 SMB shares, browsing to, Extensible Markup Language File quarantine, 459–461 717–719 (XML), 549–550 File restoration. see SMB2, browsing to, Extensions Time Machine 694–695 of files, 490 File-sharing services SMB2, connecting to, in Library folders, 365 AFP, browsing to, 697–699 in peripherals, 793 694–695 SMB2, generally, 693 External disks for OS X AFP, connecting to, troubleshooting, 708 Install, 106–109 697–699 using, 717–723 External disks for OS X AFP, generally, 692 WebDAV, connecting to, Recovery AFP, manually 699–700 creating, 99–105 connecting to, WebDAV, generally, 693 introduction to, 88, 721–723 File structure, 363–370 91–92 AppleDouble issues File systems reformatting, in, 708 components of, 235–239 100–102, 107 automatic authentication Disk Utility for mount testing, 105, 109 in, 695 management in, External disks for Time automatic mounting 251–252 Machine, 431 in, 720 Disk Utility for partition External USB devices, browsing to file shares in, schemes in, 257–260 797–798 693–695 Disk Utility for secure connecting to, erasing in, 247 F generally, 693 ejecting disks, 260–264 F12 key, 858 connecting to, manually, ejecting disks in, 250– Fast user switching 697–700 251, 253–254 contention issues FTP, connecting to, ejecting in-use volumes, with, 141 699–700 252–253 introduction to, 140–141 FTP, generally, 629, 693 ejecting volumes as Local permissions in, 310–311, Macintosh issues in, 708 Admin, 261–263 314–315 manual authentication in, ejecting volumes as user, storage issues in, 142 696–697 263–264 troubleshooting, 142–143 mounted shares in, encrypting disks in, for user accounts, 700–704 247–249 140–143 NFS, connecting to, encrypting volumes, FAT (), 699–700 264–268 239, 385–386 NFS, generally, 693 erasing and repartitioning Fax options, 806 overview of, 731 disks, 256–260 Featured view, 443 Port Scan in, 704–706 erasing disk data securely, Fibre Channel, 783 protocols for, 692–693 268–271 File Allocation Table remote management erasing disks/volumes in, (FAT), 239 of, 732 244–246 886 Index

erasing entire disks troubleshooting file restoring original securely, 270–271 systems passwords in, 289 erasing files securely, unmounting disks in, settings for, 189 246–247 250–251, 253–254 startup in, 865 erasing free space on volume formats in, in system initialization, volumes securely, 238–239 842–843 268–270 (FTP) System Preferences for Finder, encrypting connecting to, 699–700 enabling, 280–284 volumes in, 265–268 definition of, 693 technology in, 273–274 Finder for, generally, introduction to, 629 turning off, 290–291 246–247 File Transfers dialog, 743 unauthorized access formatting/reformatting File type defaults, 516–518 vs., 194 disks in, 241–242 File type identification, unlock in, 842–843 Fusion Drive in, 236–237 490–491 users of, 275–276 hidden items in. see File-sharing protocols, FileVaultMaster keychains, hidden items 692–693. see also file- 212–213 management of, 240–249 sharing services Find My iPhone, 193–194 metadata in, 381–386 FileVault 2. see also Legacy Find My Mac, 50–51, 192–194 mounting volumes in, FileVault Finder 249–254 disabling encryption on access control lists in, 297 partition schemes in, Mac HD volumes, AFP shares in, 721–723 237–238, 256–260 290–291 AirDrop in, 749–750 permissions in. see enabling, 275–277, aliasing in, 355, 356–358 permissions 280–284 App Store downloads repartitioning disks in, encrypting system in, 446 242–244, 254–256 volumes with, 248 browsing to file shares in, repartitioning startup encrypting with, 277–278 693–695 disks in, 254–256 introduction to, 273 browsing to SMB shared restoring, 426–427 keychains in, 212–213 folders in, 717–719 Secure Empty Trash in, recovery keys in, Apple Burn Folder in, 355 246–247 saved, 279 bypassing Gatekeeper shortcuts for. recovery keys in, saving in, 463 see shortcuts generally, 276–277 Comments in, 394–396 storage in, generally, recovery keys in, using, Computer location in, 235–236 278–279, 287–289 700–701 tags of, 383–385, 393–396 resetting passwords in, copying files to shared text documents, creating, 183, 185, 287–289 folders in, 719 260–261 restarting for, 277–278 defaults for opening files troubleshooting. see restarting systems in, 516–518 file systems, protected by, duplicating files in, 170 troubleshooting; 284–287 editing files in, 519 Index 887

ejecting disks from, ownership in, 306–307 screens of remote 250–251 permissions, propagating computers and, ejecting in-use volumes folder, 308 759–761 from, 252–253 permissions, viewing file searching for user encrypting disks with, system, 293–295 documents in, 248–249 permissions entries, 396–397 encrypting volumes with, adding new, 306 SMB shared folders in, 265–268 permissions entries, 717–719 examining files manually deleting, 307 Software Updates folder in, 338–339 permissions entries, in, 121–122 file service authentication modifying, 307 Spotlight searches in, in, 695–697 permissions for 388–389 file storage in, nonsystem volumes symbolic links in, 356 246–247, 310 in, 309 in System Preferences, file system tags in, permissions for other 69–71 383–385 users in, 311–313 system root folders filename extensions in, permissions in, generally, in, 364 490–491 296, 305–308 Tags in, 395–396 Gatekeeper in, 482 Preferences in, 150–151 Time Machine restores Go menus in, 350 Preview preferences in, 436–438 Go to Folder in, in, 571 user’s Library folder and, 351–352, 361 print queues in, 818 350–351, 359–361 hard links in, 357 printers in, 805–807 zip archive creation in, hidden items in, 350–352 Quick Look in, 402–403 home folder verification 493–494, 514 zip archive expansion in, 173–174 removing apps in, in, 403 iCloud documents in, 527 486, 487 Firewalls Inspector in, 300–303 renaming volumes in, 241 applications for, generally, keychain passwords in, restored home folders 751–752 205–207 in, 173 configuration of, Launch Services in, restoring accounts in, advanced, 753–755 492–493 169–171 configuration of, basic, locking documents in, restoring data manually 752–753 503–504 via, 427–428 configuration of, metadata in, 394–396 restoring from Time exercises for, mounted shares in, Machine in, 424 764–770 700–703 revealing package content enabling, 764–765 mounting disk images in, in, 353 logs in, 768 404–405 screen sharing in, personal, generally, 729 navigating hidden items 740–743 settings for, 190 with, 350–352 stealth mode in, 768–770 No Access in, 304 888 Index

testing settings for, Folders management of fonts in, 765–768 Applications, 159, 364 375–380 viewing history of, 755 backing up, 19 removing fonts, 375–376 FireWire Burn, 355 removing fonts and, 400/800, 777–778 container, 369 375–376 data recovery and, 324 Desktop, 158 troubleshooting fonts in, introduction to, 609 Documents, 158 370, 373–374 starting target computers Downloads, 158 unavailability of fonts and, 335–336 hidden, 349–350 in, 379 Target Disk Mode in, 323 home. see home folders validating fonts, 379–380 Firmware Library. see Library validating fonts in, installing folders 379–380 OS X Mavericks Mobile Documents, 511 Fonts and, 17–18 Movies, 158–159 adding for single users passwords in, 179, , 158–159 only, 377–378 194–196, 208–210 New Image from, confirming unavailability in system initialization, 408–410 of, 378–379 840–843 permissions in, 308 disabling, 373 in system Pictures, 158–159 installing, 371–372 troubleshooting, Public, 157–159, 177 introduction to, 371–374 859–860 shared, 717–721 management of, 375–380 UEFI and, 841–843 sharing, 300–304 removing, 375–376 updates in, 17–18 Sites, 159 troubleshooting, 373–374 Firmware Password Utility Smart, 389–390 validating, 379–380 controlling startup with, SMB shared, 717–721 Forcibly quitting applications 208–210 StudentMaterials, 76–80 Activity Monitor for, introduction to, 91 System, 364 564–566 resetting passwords user’s Library. see user in Dashboard, in, 186 Library folders generally, 561 First Aid UUID keychain, 212 exercises in, 561–567 Keychain Access and, Font Book Force Quit windows 217, 220, 231–232 adding fonts for single for, 563 Repair Disk Permissions users only, 377–378 in troubleshooting, in, 327 confirming unavailability generally, 543–544 repairing partition of fonts, 378–379 via Dock, 562 tables/volumes disabling fonts, 373 Forked file systems, in, 337 installing fonts, generally, 381–382 in Verify and Repair, 371–372 Format of backups, 321–322 installing fonts, single 416–417 Flags, 382–383 users only, 377–378 Formatting disks, 241–242 Flash disks, 308–309 introduction to, 371–374 Framework plug-ins, 793 Flash storage, 235 Frameworks, 365 Index 889

Free Berkeley Software Guest user accounts Hierarchy Distribution in FileVault 2, 284–285 of permissions, 297–299 (FreeBSD), 454 introduction to, in startup process, FreeBSD (Free 131–132 865–868 Berkeley Software security of, 176 of system resources, Distribution), 454 GUID Partition Table (GPT), 366–368 FTP (File Transfer Protocol) 100–102, 237 High-Definition Multimedia connecting to, 699–700 Interface (HDMI), 785 definition of, 693 H History. see also logs introduction to, 629 Hangs, 545–547, 575–576 of app purchases, 476 Full disk encryption Hard links, 356–357 of document versions, file systems/storage, Hardware 501–502 270–271 interfaces for, 608–610 of personal firewalls, 755 FileVault 2 for, 189, 194 Overview pane for, of software updates, Fusion Drive 329, 331 120–121 Disk Utility and, 243, 318 preferences for, 56 Home Directory, 134–135 in file systems and serial for, 61 Home folders storage, 236–237 in System Information, contents of, 157–159 796–797 copying to new user G in system accounts, 169–173 Gatekeeper, 461–463, 482–484 troubleshooting, 859 creating, 165–168 General preferences HDMI (High-Definition deleting user accounts Auto Save in, generally, Multimedia and, 160 518–519 Interface), 785 introduction to, 157 default behaviors in, 528 Hearing feature, 553 Migration Assistant for, disabling Auto Save Help, 95. see also Safari 161–163 in, 513 HID (human input permissions for, resuming after quit in, devices), 790 repairing, 345–346 512–513 Hidden items permissions for sharing, turning off Auto Save bundles, 352–354 300–302 in, 531 files/folders as, 349–350 preserving while deleting General security settings, Finder for navigation of, user accounts, 187–188 350–352 168–169 Go menus, 350, 359 Go to Folder revealing, resetting permissions in, Go to Folder, 351–352, 351–352, 361 327–328 360–361 navigation of, 350–352, restoring deleted user Gopher, 629 359–362 accounts and, GPT (GUID Partition Table), packages, 352–354 165–174 100–102, 237 shortcuts for. see restoring manually, Graphics files, 495 shortcuts 163–165 Green status, 655 user’s Library folder, user, 364 Group ownership, 295 350–351, 359–361 verifying, 171–174 890 Index

Host network identification, Keychain. see iCloud , 731 735–737 Keychain Image format, 405, 407, 409. Host-sharing services linking to existing see also disk images AirDrop, 748–751 accounts in, 147–148 iMessage, 691 Bonjour, discovery managing documents in, Incompatible software, 542 protocols in, 734 506–511 Indexing, 389–390 dynamic service opening documents from, Industry-standard formats, 11 discovery in, 733 525–527 Initialization of systems firewalls and. see personal saving documents to, booter in, 840, 842–844 firewalls 507–508, 523–524 FileVault 2 unlock in, host network in Setup Assistant, 49–52 842–843 identification in, storing documents in, firmware in, 840–843 735–737 523–527 introduction to, 840 introduction to, 729–730 iCloud Keychain kernel in, 840, 844–845 network service access authentication in, 214, POST in, 841–842 issues in, 757 222–225 system launchd in, 841, network service introduction to, 52, 212, 845–846 communication in, 220–221 troubleshooting, 858–862 756–757 in keychain management, Inspecting file systems, overview of, 730–733 220–225 317–320 screen sharing and. see login keychains vs., Inspector Screen Sharing 214–215 Shared folder in, 302 SMB, discovery protocols Security Code, 222–224 Sharing & Permissions in, in, 734–735 iCloud Security Code, generally, 300–301 troubleshooting, 756–757 222–224 Installation using, 758–763 Identification (IDs). see IDs app for. see OS X Installer HTTP (Hypertext Transfer (identification) of applications. see Protocol), 629, 683 Idle wake ups, 540 application Human input devices IDs (identification) installation (HID), 790 at App Store. see Apple of automatic software Hypertext Transfer Protocol IDs at App Store updates, 126 (HTTP), 629, 683 Apple. see Apple IDs of Configuration Profile, in network services, 81–83 I 678–679 of Mavericks. see iCloud PIDs, 540, 565–566, installing Auto Save in, 498 865–868 OS X Mavericks contacts from, 527 SSIDs, 593 Installer. see OS X Installer creating new accounts in, UIDs, 135 Installing OS X Mavericks 148–150 UUIDs, 135, 212 Apple software updates document architecture in, IEEE (Institute of Electrical in, 17 510–511 and Electronics backing up data in, 35 Find My Mac in, 192–194 Engineers), 582, 777 backing up files/folders, 19 Index 891

choices for, 12–13, 24–26 upgrading a Mac for, cellular connections to, clean installations in, 25 preparation, 28–35 610–611 destinations for, 25–26 upgrading previous messaging services, 691 erasing Mac systems for, systems, OS X sharing services via, 732 40–45 Installer for, 23–25 Internet & Wireless firmware updates in, upgrading previous preferences, 56 17–18 systems, preparation Internet Accounts preferences Installer logs in, 27–28, for, 13–20 for Calendar, 45–46 upgrading to OS X 680–682, 686 introduction to, 9–11 Mavericks, 36–40 for Contacts, 680–682, Mavericks already verification of, 45–46 687–688 installed and, 12 verifying compatibility for Mail, 680–684 multiple partitions in, of third-party for , 680–682, 21–22 application com, 689–691 network settings 18–19 network services documentation in, verifying requirements configuration in, 34–35 for, 14–20 680–682 new features in, 10–11 Institute of Electrical and network services in, on newer Mac Electronics Engineers generally, 679–680 systems, 24 (IEEE), 582, 777 new network account partitioning options in, Interacting feature, 553 setup in, 710–713 21–22 Interfaces for Notes, 685 performing, 22–26 DVI, 785 for , 686 settings documentation EFI, 841–842 viewing existing accounts for, 20 HDMI, 785 in, 709–710 single system partitions lists of, 615 Internet Protocol (IP) in, 21 managing, 615–617 addresses standards for integration multiple simultaneous, in Add Printer, 806 of, 11 613–615 DHCP and, 590 starting up from in network configuration, history of, 579 recovery/install 580, 612–615 introduction to, 582–583 disks, 40–41 in Network Utility, of network services, system disks, preparation 660–661, 673–674 678–679, 735 of, 20–22 SCSI, 783 router addresses and, troubleshooting, 27–28 UEFI, 841, 843 583–584 up-to-date information Internal devices, 795–797 subnet masks and, 583 on, 20 Internet Internet Protocol (IP) proxies, upgrade vs. install accounts. see Internet 613, 629–630 options for, 25 Accounts preferences Invisible files, 397–399 upgrading from earlier addresses. see Internet Invisible networks, 600 OS X systems, 12–13 Protocol (IP) Invitations, 687 addresses 892 Index

IP (Internet Protocol) KEXTs (kernel extensions) resetting passwords in, addresses in peripherals, 792–793 217–218 in Add Printer, 806 in system initialization, retrieving passwords in, DHCP and, 590 843–844 229–231 history of, 579 in system in Safari, 215–216 introduction to, 582–583 troubleshooting, status in menu bars, of network services, 860–861 225–227 678–679, 735 Keyboards, 48 storing passwords in, router addresses and, Keyboard-videomouse (KVM) 227–229 583–584 switches, 857 synching keychain/ subnet masks and, 583 Keychain Access account passwords, IP (Internet Protocol) proxies, First Aid in, 217, 220, 231–232 613, 629–630 231–232 synchronizing passwords ISO 9660, 240 keychain status in, in, 203–207 iTunes, 765–768 225–227 system of keychain files managing keychain files in, 211–213 J in, 218–219 user keychains in, Java applications, 454–456 managing keychain items 214–215 Java SE 6 (Standard in, 213–214 KVM (keyboard-videomouse) Edition), 455 repairing keychain files switches, 857 Java SE 7 from Oracle, in, 220 455–456 retrieving stored L JavaScript, 454 passwords in, L2TP over IPSec (Layer 2 Journaled, Encrypted (Mac OS 229–231 Tunneling Protocol Extended) volumes, synchronizing keychain over Internet Protocol 273, 414 passwords in, Security), 617 Journaled Mac OS Extended 205–207, 217–218 LANs (local area networks) volumes, 238–239 Keychain management network services via, .jpg files, 490 file management in, 614, 679 218–219 traffic on, 585–586 K file repair in, 220 virtual, 612 , 695, 704 iCloud Keychain in. see VPN configuration Kernel extensions (KEXTs) iCloud Keychain and, 617 in Library folders, 365 introduction to, 211, 213 Launch Services in peripherals, 792–793 Keychain Access in. see application registration in system initialization, Keychain Access in, 491 843–844 in Library folders, 365 in document in system local keychain files in, management, troubleshooting, 212–213 489–493 860–861 passwords in, generally, file type identification in, Kernels, 840, 844–845, 178, 183 490–491 860–861 settings in, 492–493 Index 893

LaunchAgents, 365 Legacy Mac applications, 454 home folder creation in, launchd Lesson structure, 4–5 165–168 for apps, 566 Library folders home folder deletion in, logout in, 855 application containers 168–169 restart in, 855–856 in, 369 home folder verification shutdown in, 855–856 application support in, 173–174 in startup process in, 365 Parental Controls in, hierarchy, 865–868 corrupted resources 153–154 in system initialization, in, 551 repartitioning startup 841, 845–846 examining, 359–361 disks in, 254 in system extensions in, 365 resetting passwords in, troubleshooting, Finder and, 350–351 199–201 861–862 frameworks in, 365 restored home folders in, in user sessions, 847–850 in home folders, 158 171–173 for widgets, 560 introduction to, 364 restoring accounts in, LaunchDaemons, 365 keychains in, 365 169–171 Launchpad, 485–486 LaunchAgents in, 365 Setup Assistant for, 65–68 Layer 2 Tunneling Protocol LaunchDaemons in, 365 text document creation over Internet Protocol logs in, 365–366 in, 260–261 Security (L2TP over preference files in, 366, Users & Groups in, IPSec), 617 547–551 151–152 Learning methodology, 4 in, 366 Local area networks (LANs) Legacy FileVault. see also Spotlight plug-ins in, 390 network services via, FileVault 2 Startup Items in, 366 614, 679 introduction to, 178 system resource domains traffic on, 585–586 keychains in, 212–213 and, 366–367 virtual, 612 master passwords at login system resources in, VPN configuration to, 182 364–365 and, 617 master passwords in, Link aggregates, 612 Local group user generally, 180–181 Lists of network services, 615 accounts, 133 passwords in, generally, Local Admin. see also Local issues, 654 178, 183–185 administrator accounts Local keychain files, 212–213 resetting master configuration profiles Local Library folders, 364 passwords in, in, 83 Local network printers, 184–185 creating standard user 803–804 resetting passwords in, accounts in, 144–146 Local resource domains, generally, 183–184 disk image creation in, 366–367 security settings in, 410–412 Local snapshots, 415, 424–425 189–190 ejecting volumes as, Local storage, 327–328 Spotlight indexes in, 390 261–264 Location Services, 191 technology in, 273–274 enabling FileVault in, Locations of documents, Time Machine and, 418 280–284 498–499 894 Index

Locations of networks in personal firewalls, purchase history in, 476 changing, 607–608 755, 768 purchase management in, configuration of, 606–607 in troubleshooting 449–451 introduction to, 605–606 applications, 543 reinstalling apps in, 486 in network configuration, Lookup removing installed apps 605–608, 631–638 introduction to, 662–663 from, 466–467 Wi-Fi only, 647–648 troubleshooting networks requirements in, 442–443 Locks via, 672–673 sandboxed applications on documents, 503–506, from, 368 521–522 M searching in, 444 permissions and, 299 MAC (Media Access Control) security of apps in, 458 in System Preferences, 57 addresses, 581–582, selecting apps from, Log out automatically, 852 585–586 467–471 Logical Volume Group Mac App Store standard accounts in, repairing partition account management in, 130–131 tables/volumes and, 446–449 testing apps in, 475–476 337, 342 application sandboxing updating Apple IDs in, starting target computers in, 459 447–448 and, 335–336 automatic updates from, up-to-date software Login keychain passwords, 112–117, 124–126 from, 466 204, 212 browsing in, 443 verifying Apple IDs Login shells, 135 compatible apps in, 491 in, 449 Logins creating new, 474–475 Mac OS Extended (Journaled, remote, 732 creating new Apple IDs Encrypted) volumes, resetting passwords in, 448 273, 414 at, 182 downloading Installer Mac OS Extended safe mode, 863 from, 36–37 volumes, 238 for user accounts, existing Apple IDs in, Mac OS Standard 138–140, 146–147 471–472 volumes, 238 in user sessions, 863 Featured view of, 443 Macintosh computers loginwindow Gatekeeper in, 462 AirDrop between, logout in, 855 iCloud accounts in, 749–751 restart in, 855–856 473–474 installing OS X Mavericks shutdown in, 855–856 installing Apple IDs on, 24, 28–35 troubleshooting, 861–863 in, 447 issues with, 708 in user sessions, 847–850 installing apps from, MacBook Pro, 329–331 Logout, 855, 863 441–446 Mavericks compatible Logs. see also history introduction to, 23–24 with models of, 16 in Installer, 27–28, limiting access in, migrating from, 53 45–46 451–452 network settings in, in Library folders, managing Apple IDs 34–35 365–366 in, 449 OS X Recovery on, 88–89 Index 895

registering, 52 of keychains. see keychain Memory management, in Setup Assistant, 52 management 535–536, 541 upgrading, 28–35 of memory, 535–536 Memory tab, 541 Macintosh HD, 286–287 of mobile devices, 627 Menus Macs. see Macintosh of network configuration, Go, 359 computers 615–617 status in, 225–227 Mail of power, 535 Wi-Fi status in, 595–597 access to, 677 of printing, 829–835 Messages Connection Doctor in, remote, 743, 758–759 Internet Accounts 706–707 Mandatory requirements, 5–6 preferences for, iCloud browser and, 510 Manual authentication, 680–682 Internet Accounts 696–697 in network services, preferences for, Manual software updates 689–692 680–682 in classrooms, 121–123 Screen Sharing in, 738, in network services, Installer app for, 744–745 generally, 683–685 advanced features, troubleshooting, 707 testing new accounts in, 119–120 Metadata 713–715 Installer app for, AppleDouble for, troubleshooting, generally, 117–118 385–386 706–707, introduction to, 117 comments in, 393–396 724–726 for third-party examining file, 393–396 turning off, 723–724 software, 466 extended attributes in, Mainserver Master Boot Record (MBR), 382–383 connecting to, 75 237–238 file flags and, 382–383 downloading apps from, Master passwords. see also file system tags and, 480–481 passwords 383–385, 393–396 printing from, introduction to, 178, in file systems, 381–386 823–829, 832 180–181 introduction to, 381 Malware, 458–461 resetting, 184–185 Spotlight and. see Managed user accounts, 152, Mavericks. see OS X Spotlight 155–156. see also user Mavericks Microsoft support, 708 accounts MBR (Master Boot Record), Migration Assistant Management 237–238 for configuring OS X of applications. see MDM (Mobile Device Mavericks, 52–54 application Management), 627 for home folders, management MDNS (Multicast DNS), 11. 161–163 of Bluetooth settings, see also DNS (Domain in installation of OS X 788–789 Name System) Mavericks, 20 of documents. see Media Access Control (MAC) recovering data from document addresses, 581–582, nonstarting systems management 585–586 via, 324 Media streaming, 584 896 Index

in Setup Assistant, N LAN traffic in, 585–586 generally, 49 N startup shortcut, 857 locations, 665 Time Machine backups Names MAC addresses in, and, 162 of computers, 71–73, 581–582 Time Machine restores 735–737 monitoring connectivity and, 425–426 of domains. see Domain of, 601–604 Mini DisplayPort, 780, 785 Name System (DNS) network accounts in, Mission Control, 557–558 of processes, 539 710–715 Mobile Device Management of users, 178 Network Utility in. see (MDM), 627 in Users & Groups, Network Utility Mobile Documents 134–135 preferences in. see folders, 511 Native OS X applications, Network preferences Modems, 613 453–454 protocols in, 580 Monitoring Navigating hidden items, resource domains in, activities. see Activity 350–352, 359–362 366–367 Monitor NetBIOS (Network Basic router addresses in, applications, 538–541 Input/Output System) 583–584 network connectivity, names in, 736 services in. see network 601–604 in Network preferences, services in SMART 627–629 Setup Assistant in, 49 technologies, 319 support for, 613 status in, 666–667 Mounted shares NetBoot, 844 subnet masks in, 583 automatic, 720–721 Network Basic Input/Output terminology in, 580–581 automatically connecting, System (NetBIOS) Transmission Control 703–704 names in, 736 Protocol in, 584 disconnecting, 702 in Network preferences, troubleshooting in. see in file-sharing services, 627–629 troubleshooting generally, 700–704 support for, 613 networks introduction to, 700–701 Network basics. see also verifying settings for, Mounting volumes, 249–254 network configuration 597–599 Mouse preferences, 73–74 action of networks in, visible networks, Move To command, 500 585–590 599–600 Movies folders, 158–159 concepts in, 580–584 WAN traffic in, .mp3 files, 490 connectivity in, 601–604 586–587 Multicast DNS (mDNS), 11. DHCP in, 589–590 Wi-Fi, configuring, see also DNS (Domain Domain Name System in, 592–593 Name System) 587–589 Wi-Fi, connecting to, Multihomed locations, interfaces in. see network 597–601 639–641 interfaces Wi-Fi, verifying Multiple partitions, 22 introduction to, 579 connection to, Multiple simultaneous invisible networks, 600 600–601 interfaces, 613–615 IP addresses in, 582–583 Wi-Fi authentication Music folders, 158–159 in, 594 Index 897

Wi-Fi status menu multiple simultaneous lists of, 615 options in, 595–597 interfaces in, managing, 615–617 WPA enterprise 613–615 multiple simultaneous, configuration in, 595 NetBIOS in, 627–629 613–615 Network configuration. see in Network preferences. in Network Utility, also network basics see Network 660–661, 673–674 802.1X protocol in, preferences Network preferences. see also 626–627 network services in, Network Utility advanced, generally, 605, 613–617, 639–642 Assist Me button in, 659 622–631 Network Utility and. see connectivity monitoring basic level of, 591–597 Network Utility via, 602–604 cellular Internet optional, 622–631 DHCP-supplied locations connections in, Preferred Network lists, in, 632–635, 658 610–611 adding to, 649–650 Diagnostics in, 669–672 changing service orders Preferred Network lists, DNS settings in, 622–625 in, 641–642 clearing, 649 Ethernet in, 631, 655–656 DHCP service, turning Preferred Network order hardware interfaces off, 632 in, 651 in, 609 DHCP-based network protocols in, 608–613 introduction to, 591–592 locations in, 633–635 in Setup Assistant, 49 multihomed network DHCP-supplied static network locations locations in, 639–641 configurations in, 635–637 NetBIOS in, 628–629, 736 in, 632 TCP/IP in, 622–625 network interfaces in, documentation of, 34–35 virtual network services, 615–617, 756 Ethernet option in, 611–612 network locations in, 630–631 VPN in, 617–622, 606–607 hardware interfaces in, 643–646 Port Scan tab in, 715–716 608–610 Web access testing in, 638 proxy settings in, interfaces in, 612–613 Wi-Fi, advanced 629–630 IP proxies in, 629–630 configurations, Set Service Order in, lists of network services 625–626, 647–651 641–642 in, 615 Wi-Fi, basic static network locations locations in, generally, configurations, in, 635–637 605–608, 631–638 592–597 status indicators in, 655, locations in, multihomed, WINS in, 627–629 666–667 639–641 Network Diagnostics, 659, TCP/IP settings in, locations in, Wi-Fi, 669–672 622–625 647–648 (NFS), VPN in, configuring, managing network 693, 699–700 618–620, 645 services in, 615–617 Network interfaces VPN in, connecting/ multihomed locations in, configuration of, 612–615 disconnecting, 639–641 introduction to, 580 621–622 898 Index

Wi Fi settings in, Mail app in, in, 663–664 625–626 troubleshooting, traffic monitoring in, Wi-Fi connectivity 724–726 673–674 in, 656 Mail app in, turning off, troubleshooting with, Wi-Fi-only locations in, 723–724 generally, 659–660 647–649 Mail in, 683–685 New Blank Image dialog, 406 WINS in, 628–629, 736 Messages in, 689–692 New Image from Folder Network services Network Utility for, dialog, 408–410 access issues in, 757 726–728 NFS (Network File System), accounts in, 710–715 new accounts in, setting 693, 699–700 apps for, generally, 679 up, 710–713 No Access, 296, 304 apps for troubleshooting new accounts in, testing, Nonstarting systems, of, 706–708 713–715 324–325 architecture of, 677–679 Notes in, 683–685 Nonsystem volumes, Calendar in, 686–687 order of, 639–642 308–309 communication in, 678, Reminders in, 686–687 Nonvolatile RAM 756–757 Safari in, 683 (NVRAM), 842 configuration of, scanning servers in, Notes, 681, 683–685 613–617, 715–716 NT File System (NTFS), 680–683 software in, 678 240, 386 configuring accounts in, status of, 655 NTFS (NT File System), 709–716 troubleshooting, 240, 386 Connection Doctor for, 704–708, NVRAM (nonvolatile 724–726 723–728 RAM), 842 Contacts in, 687–689 virtual, 611–612 existing accounts in, Network Setup Assistant, O 709–710 591–592 Online gaming, 584 file-sharing services Network Utility. see also Online help. see Safari in. see file-sharing troubleshooting networks Open Directory, 134 services hardware interfaces in, Open source software, 11, file-sharing protocols 608–609 454, 457 and, 692–693 interface information in, Open Systems firewalls for. see firewalls 660–661, 673–674 Interconnection in host-sharing services, introduction to, 91 Reference (OSI) 756–757 Lookup in, 662–663, model, 580 identification in, 678–679 672–673 Open With feature, 515–516 Internet Accounts for network services, opendirectoryd, 848 preferences in, 726–728 Option startup shortcut, 857 679–680 ping tool in, 661–662, Optional add-ons, 6–7 introduction to, 581, 677 667–669 Option-N startup lists of, 615 Port Scan in, 704–706 shortcut, 857 stealth mode in, 768–770 Oracle Corporation, 454 Index 899

Organizationally Unique external Install disks for, P Identifiers (OUIs), 581 creating, 106–109 PAC (proxy auto-config) files, OS X Installer Firmware Password 629–630 acquiring, 23, in, 195 Packages, 352–354 106–107, 445 Help for, 95 Pairing devices, 786–788 external disks for, installing OS X Mavericks PAN (personal area 106–109 and, 44–45 network), 610 logs in, 27–28 introduction to, 87 Parallels Desktop, 611 for manual software OS X Install and, 97–98, Parental Controls updates, 117–120 106–109 in guest accounts, 176 OS X Recovery and, permissions in, 344–345 limiting access to App 90–92, 97–98, Recovery Disk Assistant Store, 451–452 106–109 in, 99–100, 103–104 in user accounts, upgrading previous repairing partitions/ 136–138, systems and, 23–25 volumes in, 342–344 153–154 OS X Mavericks resetting passwords in, Partition Layout, 254 configuring. see 183–186, 196–198, Partition schemes, 237–238, configuring 327–328 256–260 OS X Mavericks Restart in, 98 Partitions installing. see installing root accounts and, 177 in disk images, 407 OS X Mavericks starting computers with, options for, 21–22 as mandatory 87–88, 93–94 repairing in OS X requirement, 5 Startup Disk in, 98 Recovery, 341–345 new features in, 10–11 Time Machine restoration repairing in target disk study guide overview in, 97, 426–427 mode, 334–341 on, 3 using, generally, 93 troubleshooting, upgrading to. see utilities in, 88–91, generally, 321–325 upgrading to 94–98 Password Assistant OS X Mavericks OS X Utilities disk image creation OS X , 816 Install OS X in, 43–45 and, 411 OS X Recovery in OS X Recovery, resetting passwords in, Disk Utility for, 96 89–91, 94 199–201 external disks for, OS X v10.6.6, 442 in security, 180 creating, 99–105 OSI (Open Systems Passwords external disks for, Interconnection in administrator generally, 91–92 Reference) model, 580 accounts, 67, 176 external disks for, Other preferences row, 57 changing, 179 reformatting, OUIs (Organizationally for encryption 100–102, 107 Unique Identifiers), 581 of backups, external disks for, testing, Ownership, 295, 306–307. see 418–419, 421 105, 109 also permissions in File Vault 2, 287–289 900 Index

firmware, 194–196, printing services in, changing ownership in, 208–210 834–835 306–307 keychain, generally, 183, printing to, 833–834 default, creating items 203–207 tools in, 816–817 with, 309–313 keychain, resetting, Performance features, deleting entries for, 307 217–218 534–535 examining as another keychain, retrieving, Peripherals user, 310–313 229–231 audio connectivity in, 784 in file systems, keychain, storing, Bluetooth, 780–781, generally, 293 227–229 786–789 Finder managing, Legacy FileVault, buses, 775 305–308 183–185 connectivity in, 774–775 hierarchical contexts of, login keychain, 204 device classes of, 790–791 297–299 lost, 199–203 drivers for, 792–793 for home folder sharing, master, 180–181, 184–185 expansion buses, 781–782 300–302 recovering in FileVault 2, extensions in, 793 for home folders, 278–279 external USB devices, repairing, 345–346 resetting, generally, 797–798 for home folders, 181–186 fast user switching resetting, 327–328 resetting as administrator, and, 141 for home folders, storage 199–201 FireWire 400/800, in, 310 resetting in Apple IDs, 777–778 introduction to, 293 201–203 internal devices, 795–797 management of, 304–309 resetting in File Vault 2, introduction to, 773 modifying entries for, 307 287–289 storage buses, 782–783 for nonsystem volumes, resetting in OS X System Information for, 308–309 Recovery, 185–186, 795–798 ownership for, 295 196–198 technologies for, propagating folder, 308 resetting lost, 199–203 generally, 773 Repair Disk Permissions, resetting with Thunderbolt, 778–780 326–327 Terminal, 91 troubleshooting, 790–794 for sharing files/folders, restoring original, 289 USBs 1.0/2.0/3.0, 300–304 for root accounts, 177 775–777 for sharing new items, for security, generally, video connectivity in, 303–304 177–181 784–785 standard UNIX-style, Security & Privacy Permissions 295–300 settings for, 187–188 access control lists for, for system file repair, types of, 178–179 296–297 340–341 PCI Express, 329, 778–783 adding new entries system file, repairing, PDF (Portable Document for, 306 344–345 Format) changing as another user, testing changes in, printing files in, 799–800 313–315 313–316 Index 901

testing new, 315–316 Port Scan Internet Accounts. see troubleshooting, in file-sharing services, Internet Accounts generally, 325–328 704–706 preferences in User folders, 171 in Network Utility, in Library folders, 366 viewing, 293–295 704–706 Mouse, 73–74 Personal area network scanning servers with, Network. see Network (PAN), 610 715–716 preferences Personal firewalls troubleshooting network Personal, 56 applications for, connections via, Printers & Scanners. see generally, 726–728 Printers & Scanners 751–752 Portable Document Format preferences configuration of, (PDF). see PDF (Portable resolving corrupted, advanced, 753–755 Document Format) 548–549 configuration of, basic, POSIX-style permissions, Sharing. see Sharing 752–753 295–296 preferences configuration of, POST (Power-On Self-Test), System. see System exercises for, 841–842, 859 Preferences 764–770 PostScript (PS) files, 799–801 in Time Machine, 420 enabling, 764–765 PostScript Printer Description troubleshooting, 547–551 introduction to, 729 (PPD), 799–802 in troubleshooting logs in, 768 Power management, 535 applications, 543, stealth mode in, Power Nap mode, 416, 853– 568–572 768–770 854. see also sleep modes for user accounts, testing settings for, Power-On Self-Test (POST), 150–151 765–768 841–842, 859 viewing, 549–551 viewing history of, 755 PowerPC processors, 454 Preferred network order, 651 Personal preferences, 56 PPD (PostScript Printer Preferred Networks lists Pictures folders, 158–159 Description), 799–802 adding networks to, PID (process identification), PPP (Point-to-Point 649–650 540, 565–566, 865–868 Protocol), 613 clearing, 649 Ping tool, 661–662, PPPoE (Point-to-Point joining, 650 667–669, 705 Protocol over manually adding Plug-ins Ethernet), 612 networks to, 650 framework, 793 PPTP (Point-to-Point testing order of, 651 Quick Look, 495–496 Tunneling Protocol), 617 VPN connectivity Spotlight, 390–391 Preemptive multitasking, 534 in, 646 Point-to-Point Protocol over Preferences Presets for printing, Ethernet (PPPoE), 612 Accessibility, 552–553 814–816. see Point-to-Point Protocol for automatic also printing (PPP), 613 software updates, Preview, 491, 515–518, Point-to-Point Tunneling 115–117, 124 568–571 Protocol (PPTP), 617 editing, 549–551 902 Index

Printers & Scanners to PDFs, 833–834 Public folders preferences peripherals for, 791 in home folders, 157–159 directly attached printers presets for, 814–816 sharing in, 301–302 in, 802–803 to printers, 829–831 sharing only user manually configuring queues in, 813, 817–820, accounts and, 177 new printers in, 805 832–833 Publishing, 687 network connected resetting, 837–838 printers in, 808 sharing printers in, 731, Q overview of, 809 809–812 Quartz, 816 print queues in, 818 troubleshooting, Queues of print jobs, 813, resetting printing systems 821–823, 817–820, 832–833. see in, 837–838 836–838 also printing scanning in, 810 Privacy settings Quick Links, 446–447, 449 sharing printers in, Accessibility in, 191 Quick Look 811–812 introduction to, 190–192 Auto Save and, 499 Printing in Safari, 192 converting binary code architecture of systems in Spotlight, 392–393 in, 550 for, 799–802 Privately hosted messaging in document basic, 812–813 services, 692 management, Bonjour printers for, Privileges. see permissions 493–496 823–828 Process identification (PID), edited files in, 520 configuration of, 540, 565–566, 865–868 introduction to, 425 802–809, Process names, 539 plug-ins, 495–496 823–828 Process security, 458 Preview preferences in, CUPS for, 799–802, Processes of applications 569–570, 572 836–837 features of, 534 windows in, 495 detailed, 814–816 managing, generally, Spotlight and, 387–388 directly attached printers 533–538 viewing files with, for, 802–803 monitoring, 538–541 514–515 introduction to, 799 types of, 534–536 QuickTime, 495 local network printers in, Profiles, 58–59, 643 803–804 files, 547 R management of, 812–820, Protected memory, 535 Read & Write permissions, 829–835 Protocols. see also specific 296, 298–304 manually configuring protocols Read Only permissions, 296, printers for, 804–809 for file-sharing services, 298–304 modifying existing 692–693 Real Time Streaming Protocol printer configuration in network configuration, (RTSP), 629 for, 809–810 608–613 Recovery. see OS X Recovery PDF services for, Proxy auto-config (PAC) files, Recovery Disk Assistant, 816–817, 629–630 99–100, 103–104. see also 834–835 PS (PostScript) files, 799–801 OS X Recovery Recovery HD, 88, 93–95, 99 Index 903

Recovery keys in OS X Recovery, systems, generally, Apple saved, 279 185–186, 197–198 855–856 introduction to, 277–279 for security, 179, 181–186 systems with File Vault 2, saving, 276–277 Resetting print jobs, 837–838 277–278, 284–287 in startup encryption, Resource passwords, 179. see Restoring data. see Time 281–283 also passwords Machine using, 287–289 Resources of applications, Restoring deleted user Red status, 655 551–552 accounts, 165–174 Reformatting disks, 100–102, Resources of systems. see also Restoring home folders, 107, 241–242 System Information 163–174 Registering Macs, 52 adding fonts for single Restoring original Reminders, 686–687 users only, 377–378 passwords, 289 Remote Apple events, 732 application sandbox Resume after log out Remote login, 732 containers, 368–369 feature, 512 Remote Management disabling fonts via Font Resume after quit feature, enabling screen sharing Book, 373 512–513 in, 758–759 domains of, 366–367 Retina, 537, 868 screen sharing in, 743 fonts/Font Book, Root certificates, 213 Removing applications, generally, 371–374 Root user accounts, 132, 484–487 fonts/Font Book, 176–177 Removing installed software, managing, 375–380 compatibility 466–467 hierarchy of, 366–368 environments, 454 Repair Disk installing fonts via Font Router addresses, 583–584 in Disk Utility, 326–327 Book, 371–372 RTSP (Real Time Streaming partitions in, 337–338, introduction to, 363 Protocol), 629 342–344 in Library folders, system file permissions 364–365 S in, 340–341, OS X file structure, Safari 344–345 363–370 downloading apps volumes in, 337–338, removing fonts, 375–376 from, 465 342–344 troubleshooting, downloading apps from Repartitioning disks generally, 370 Mainserver in, 480 dynamically, 254–256 troubleshooting fonts via keychain management in, introduction to, 242–244 Font Book, 373–374 215–216 startup, 254–256 types of, 364–366 multihomed network without erasing, 254–256 unavailability of fonts in, locations in, 641 Resetting passwords 378–379 network locations in, Apple IDs and, 202–203 validating fonts, 379–380 generally, 666 in File Vault 2, 287–289 Restarting in network services, for home folders, 327– applications, 542 generally, 683 328, 346 in OS X Recovery, 98 on OS X Recovery, 95 in keychains, 217–218 Power Saver in, 535 904 Index

Recovery Disk Assistant introduction to, 731, erasing free space on in, 99–100 737–738 volumes and, Set Service Order in, 642 Messages and, 744–745 268–270 software updates from, system, enabling, file quarantine in, 122–124 739–740 459–461 Tags in, 393–394 virtual displays in, FileVault for. see testing Web access in, 638 761–763 FileVault 2 troubleshooting, 706 SCSI (Small Computer System Find My Mac in, 192–194 for troubleshooting Interface), 783 firewalls for. see firewalls networks, 672–673 Searching firmware passwords VPN connectivity in, 646 App Store, 444 for, 179, 194–196, Safe Boot, 861–862 custom queries for, 208–210 Safe mode login, 863 574–576 Gatekeeper in, 461–463, Safe sleep mode, 852–853 results of, 392 482–484 Sandboxed applications, 548 with Spotlight. see General settings for, SAS (Serial Attached Spotlight 187–188 SCSI), 783 Secure Empty Trash, 246–247 of guest accounts, 176 SATA (Serial ATA), 320, Security in iCloud, 222–224 329–330, 783 account passwords for, introduction to, 175 Save As command, 500–501 generally, 178 keychains for. Saving documents, 500–501, of administrative user see keychain 507–508 accounts, 176 management Scanning Advanced settings Legacy FileVault for. see introduction to, 799 for, 188 Legacy FileVault peripherals for, 791 Apple IDs for, login keychain passwords Printers & Scanners generally, 178 in, 204 preferences for, 810 in application installation, master passwords in, servers, 715–716 458–463 generally, 178, sharing scanners for, 731 application sandboxing 180–181 Schedule of backups, 415–416 in, 458–459 master passwords in, Screen Sharing changing passwords resetting, 184–185 architecture of, 738–739 in, 179 of memory ARD remote code signing in, 459 allocation, 536 management in, in drag-and-drop OS X Recovery 746–748 apps, 463 passwords in, connecting via, 740–743 of erase options, 185–186, 196–198 control via, generally, generally, 245–246 Password Assistant 743–744 erasing disk data and, in, 180 controlling other 268–271 passwords in, generally, computers’ screens erasing files and, 246–247 177–181 via, 759–761 permissions for sharing enabling, 758–759 new items, 303–304 Index 905

privacy settings in, firewalls in, 752–757, Service Set Identifiers (SSIDs), generally, 190–192 764–765 593, 595 privacy settings in Safari Gatekeeper in, Services for, 192 462–463, 482 for file sharing. see file- process security in, 458 General settings in, sharing services Reset Password in 187–188 for host sharing. see host- Recovery in, Macintosh HD sharing services 185–186 encryption in, issues with, 654 resetting lost passwords 290–291 Launch. see Launch in, 199–203 password changes in, 179 Services resetting master personal firewall for networks. see network passwords in, configuration in, services 181–186 752–753 ownership in, 641–642 resetting passwords as system volume Setup Assistant administrator in, encryption in, administrator accounts 199–201 277–278 and, 176 resetting passwords with Seeing feature, 553 Apple IDs in, 49–50 Apple IDs, 201–203 Self-assigned addresses, 658 in Bluetooth, 787–788 resource passwords Self-Monitoring, Analysis, and configuring networks in, 179 Reporting Technology with. see Network of root accounts, 177 (S.M.A.R.T.), 319 Setup Assistant Security & Privacy for. see Serial ATA (SATA), 320, configuring new OS X Security & Privacy 329–330, 783. see systems with, 63–66 settings for, 187–194 also ATA (Advanced countries in, 48 of sharing-only user Technology Attachment) Create Your Computer accounts, 177 Serial Attached SCSI Account in, 51 in Spotlight, 391 (SAS), 783 Find My Mac feature in, of standard user Server Message 50–51 accounts, 175 Block 2 (SMB2) iCloud in, 49–50 types of passwords in, browsing to, 694–695 iCloud Keychain in, 52 178–179 connecting to, 697–699 introduction to, 47–48 of user accounts, 175–177 definition of, 693 keyboards in, 48 Security & Privacy introduction to, 693 Network, 591–592 diagnostic report settings (SMB) network settings in, in, 545 in Add Printer, 806 generally, 49 FileVault 2 in, generally, browsing to, 717–719 registering a Mac in, 52 275–276 copying files to, 719 Terms and Conditions FileVault in, enabling, discovery protocols in, in, 50 280–284 734–735 transfer information FileVault tab in, 285–286, overview of, 731 in, 49 290–291 shared folders in, for user accounts, 136 717–721 Shared folder, 302–303 906 Index

Shared list, 693–695 ARD Remote safe, 852–853 Sharing Management in, Sharing preferences files. see file-sharing 746–748 and, 730 services Bluetooth in, 789 system, 415–416 folders, 300–304 computer names in, troubleshooting, 850–854 hosts in. see host-sharing 735–737, 756 Small Computer System services firewall configuration in, Interface (SCSI), 783 introduction to, 293–294 753–755 S.M.A.R.T. (Self-Monitoring, permissions and. introduction to, 729–730 Analysis, and Reporting see Sharing & NetBIOS/WINS names Technology), 319 Permissions in, 736 Smart Folders, 389–390 printers, 809–812 Printer Sharing in, 811 SMB (Server Message Block) screens of remote system screen sharing in, in Add Printer, 806 computers and. see 739–740 browsing to, 717–719 Screen Sharing Sharing-only user accounts, copying files to, 719 settings for. see Sharing 132, 177 discovery protocols in, preferences Shift startup shortcut, 858 734–735 Sharing & Permissions Shortcuts overview of, 731 adding new permission aliases, generally, 355 shared folders in, entries in, 305 aliases, managing, 717–721 changing ownership in, 357–358 SMB2 (Server Message 306–307 hard links, 356–357 Block 2) deleting permissions introduction to, browsing to, 694–695 entries in, 307 349–350, 354 connecting to, 697–699 examining files manually for startup, 843, 856–858 definition of, 693 and, 338 symbolic links, 355–356 introduction to, 693 in file systems, 294 Show Package Contents, SMS text messages, 222–224 in Inspector, 300 353, 404 Snapshots modifying permissions Shutdown creating new, 434 entries in, 307 in system local, 424–425 permissions for troubleshooting, in Time Machine nonsystem volumes 855–856 backups, generally, in, 309 in user sessions, 863 415–417 propagating folder Single system partitions, 22 SOCKS, 629 permissions in, 308 Single-Pass Erase, 245 Software updates removing users from Single-user mode, 868–874 from App Store, 113–115, permissions lists Sites folders, 159, 301 124–126 in, 304 Size of images, 406 automatic, 111–117, Sharing preferences Sleep modes. see also Power 124–126 access list Nap mode behavior of updates in, troubleshooting automatic wake in, 730 112–113 in, 757 in Energy Saver, 852 Index 907

checking installation system files, searching selecting alternate of, 126 for, 397–399 systems in, 857 history of, 120–121 user documents, shortcuts for, 843, Installer app for, searching for, 856–858 advanced features, 396–397 single-user mode in, 868, 119–120 SSDs (solid-state disks), 235 870–872 Installer app for, SSEDs (solid-state system initialization in, generally, 117–118 encapsulation devices), 840–846, 858–862 installing new apps 268–270 in system and, 466 SSIDs (Service Set Identifiers), troubleshooting, installing OS X Mavericks 593, 595 856–858, 864–868 and, 17–18 Standard Edition (Java of systems, generally, 839 introduction to, 111 SE 6), 455 of target computers, manual, 117–123 Standard UNIX-style 335–336 in network services, 678 permissions, 295–300 Target Disk Mode in, preferences for, Standard user accounts. see 323–324 115–117, 124 also user accounts of user sessions, 840, System Information for, creating, 144–146 847–850, 863 120–121 introduction to, 130–131 verbose mode in, Solid-state disks (SSDs), 235 security of, 175 868–870 Solid-state encapsulation Standards for integration, 11 Static network locations, devices (SSEDs), 268–270 Standby mode, 852–853 635–637 Sparse disk images, 406–407 Startup Stationery Pad, 504 Speakable Items, 555–556 administrator account Stealth mode, 753–755, Spinning-wheels, 543 creation in, 872–874 768–770 Spotlight. see also metadata examining, 864–867 Stereo audio connections, 784 indexing with, 389–390 FileVault 2 encrypting, Sticky bits, 303 introduction to, 381, 280–284 Storage 386–387 firmware passwords at, buses for, 782–783 Network Utility via, 208–210 capacities for, 235 659, 705 hierarchy of process of, in fast user switching, 142 plug-ins for, 390–391 865–868 of files. see storage of files printer drivers via, 808 identifying steps in, in iCloud, 523–527 privacy settings in, 864–865 peripherals for, 791 392–393 in Library folders, 366 Storage of files Search Results in, 392 modifying OS X defaults components of, 235–239 searching with, exercises for, 858 Disk Utility mount in, 396–399 with OS X Recovery, management options searching with, generally, 87–90, 93–94, 98 in, 251–252 387–390 resetting passwords Disk Utility partition security in, 391 at, 183 schemes in, 257–260 settings in, 392–393 908 Index

Disk Utility secure erase permissions and, 310 Synchronizing keychain options in, 247 repartitioning disks passwords, 203–207, ejecting disks improperly, dynamically, 231–232 253–254 254–256 System Administrator ejecting disks in, repartitioning disks in, accounts, 132, 177 generally, 250–251, generally, 242–244 System build numbers, 61 260–264 repartitioning startup System disks ejecting in-use volumes, disks without in installation of OS X 252–253 erasing, 254–256 Mavericks, 20–22 ejecting volumes as Local Secure Empty Trash in, multiple partitions in, Admin, 261–263 246–247 21–22 ejecting volumes as user, storage concepts in, 236 single system partitions 263–264 text documents, creating, in, 21 encrypting disks in, 260–261 System files 247–249 troubleshooting, 318–320 in OS X Recovery, encrypting volumes in, unmounting disks in, 340–345 264–268 250–251, 253–254 permissions in, 340–345 erasing and repartitioning volume formats in, repairing, 340–345 disks, 256–260 238–239 Spotlight searching for, erasing disk data securely, Storage tab, 329, 331 397–399 268–271 StudentMaterials, 76–80, 481 in target disk mode, erasing disks/volumes in, Study guide overview 340–345 244–246 Apple Training and System folders, 364 erasing entire disks Certification in, 7–8 System Information. see also securely, 270–271 exercise order in, 7 System Preferences erasing files securely, exercise requirements application compatibility 246–247 in, 5–7 in, 29–33 erasing free space on introduction to, 3 in application volumes, 268–270 learning methodology management, 538 file system components in, 4 automatic software and, 235 lesson structure in, 4–5 updates in, Finder for, 246–247, mandatory requirements 120–121, 126 265–268 for, 5–6 for configuring OS X formatting/reformatting optional add-ons in, 6–7 Mavericks, 84–86 disks in, 241–242 Subnet masks, 583 external USB devices in, Fusion Drive in, 236–237 Subscriptions, 687 797–798 introduction to, 235 S-Video, 784 firmware in, 17, 29–33 management of, 240–249 Swap Used statistics, 541 hardware requirements mounting volumes in, Symbolic links, 355–356 in, 29–33 249–254 Symmetric multiprocessing, history of installations in, partition schemes in, 534–535 120–121 237–238, 256–260 Index 909

internal devices in, 32-bit vs. 64-bit modes network locations in, 796–797 in, 537–538 606–607, 632–637 introduction to, 60–63 App Store preference Network pane in. see KEXTs in, 793 pane in, 466 Network preferences for peripherals, 774–775, Auto Save in, network settings in, 794, 795–798 518–519, 531 breaking, 665 for software updates, automatic software network settings in, 120–121 updates in, 115–117 documenting, 34–35 storage inspection with, Bonjour configuration in, New Admin in, 874 319–320 823–828 Parental Controls in, troubleshooting system checking new user 153–154 resources in, 370 accounts in, 151–152 Printers & Scanners for upgrading from computer names in, in. see Printers & earlier OS X systems, 71–73 Scanners preferences 14–15 configuring OS X resetting desynchronized USB devices in, 776 Mavericks in, 55–57, passwords in, 207 verifying application 69–74 resetting passwords in, compatibility in, creating administrator 199–201 17–18 accounts in, 66–68 resetting printing systems viewing disk information default behaviors in, in, 837–838 in, 328–331 528–530 restored home folders in, viewing installed apps in, DHCP-supplied locations 171–173 484–485 in, 632–635 restoring original System initialization Energy Saver in, 81–83 passwords in, 289 booter in, 840, 842–844 for File Vault 2, 280–286 screen sharing in, FileVault 2 unlock in, Finder Preferences in, 758–759 842–843 69–71 screens of remote firmware in, 840–843 firewalls in, 764–768 computers and, introduction to, 840 Gatekeeper in, 482 760–761 kernel in, 840, 844–845 home folder creation in, static network locations POST in, 841–842 165–168 in, 635–637, 639 system launchd in, 841, iCloud pane in, stealth mode in, 768–769 845–846 525–526, 710 Time Machine in, 420, troubleshooting, 858–862 Macintosh HD 429–432 System launchd encryption in, Trackpad preferences in, system initialization, 841, 290–291 73–74 845–846 mounting network shares Users & Groups in, system troubleshooting, in, 720–721 133–136 861–862 Mouse preferences in, virtual displays in, 763 System Preferences. see also 73–74 VPN configuration in, System Profiler multihomed network 643–646 locations in, 639–641 910 Index

System Profiler. see also System Restore Assistant, history of, 579 system resources 426–427 introduction to, 584 application compatibility System screen sharing, LANs and, 585–586 in, 29–33 738–740. see also in network configuration, firmware in, 17, 29–33 Screen Sharing 622–625 hardware requirements System security. see security WANs and, 587 in, 29–33 System sleep, 415–416 Terminal for upgrading from System troubleshooting. see creating OS X Install earlier OS X systems, troubleshooting systems disks in, 108–109 14–15 System version numbers, 61 hard links in, 356 verifying application System volumes, 277–278, introduction to, 91 compatibility in, 859–860 repairing home folder 17–18 System/Library/ permissions in, System resources. see also Keychains/, 213 345–346 troubleshooting systems SystemUIServer, 565–566 resetting passwords in, adding fonts for single 196–198 users only, 377–378 T sticky bits in, 303 application sandbox T startup shortcut, 858 symbolic links in, 355 containers, 368–369 Tags, 383–385 Terms and Conditions, 50 disabling fonts via Font Target disk mode Testing Book, 373 examining files manually apps from App Store, domains of, 366–367 in, 338–340 475–476 fonts/Font Book, in file systems, Contacts accounts, 715 generally, 371–374 troubleshooting, external disks for fonts/Font Book, generally, 322–323 Recovery, 105, 109 managing, 375–380 repairing partitions/ Mail accounts, 713–715 hierarchy of, 366–368 volumes in, 334–341 managed user accounts, installing fonts via Font repairing system file 155–156 Book, 371–372 permissions in, permissions, 313–316 introduction to, 363 340–341 personal firewall settings, in Library folders, starting target computers 765–768 364–365 in, 335–336 POST for, 841–842, 859 OS X file structure, TCP (Transmission Control Web access, 673 363–370 Protocol) TextEdit removing fonts, 375–376 history of, 579 Auto Save in, 498 troubleshooting, introduction to, 584 container folder for, 369 generally, 370 network communications creating text documents troubleshooting fonts via via, 678 in, 260–261 Font Book, 373–374 TCP/IP protocol suite default behaviors in, types of, 364–366 configured manually, 612 528–530 unavailability of fonts in, configured via editing files in, 519–521 378–379 DHCP, 612 filename extensions validating fonts, 379–380 DNS and, 588–589 in, 491 Index 911

iCloud documents in, limitations of, 417–418 Trash, 268, 467 526–527 Migration Assistant and, Troubleshooting locking/unlocking 54, 162 applications. see documents in, options in, 422–423 troubleshooting 522–523 OS X Recovery and, applications opening files in, 515 88–89, 97 fast user switching, permission and, 310–313 preferences in, 420 141–143 Preview preferences in, restoring contacts via, file-sharing services, 708 571–572 435–436 file systems. see Versions in, 498 restoring directly from, troubleshooting file Threads, 539 438–439 systems Thunderbolt restoring from, generally, fonts via Font Book, introduction to, 609 423–428, 433–438 373–374 peripherals, 778–780 restoring manually via networks. see recovering data from Finder and, 427–428 troubleshooting nonstarting systems restoring systems via, networks and, 324 426–427 OS X Installer, 27–28 starting target computers restoring via Migration peripherals, 790–794 and, 335–336 Assistant and, printing, 821–823, Target Disk Mode in, 323 425–426 836–838 Thunderbolt Bridge, 609 schedule of backups in, system initialization, Time Capsule, 415, 431 415–416 858–862 Time Machine snapshots, creating system resources, 370 architecture of, 413–418 new, 434 systems, generally. see backup volumes and, Spotlight indexing, 390 troubleshooting 431–432 vCards in, 433 systems configuration of, 418–423, TLDs (top-level domains), Troubleshooting applications 429–433 588–589 application resources in, contacts, deleting, Top-level domains (TLDs), 551–552 434–435 588–589 corrupted preferences in, disks for backup in, TOSLINK digital audio, 784 548–549 configuring, Traceroute, 663–664 custom search queries in, 420–422 Trackpad buttons, 858 574–576 disks for backup in, Trackpad preferences, 73–74 diagnostic reports in, generally, 414–415 Transfer information, 49 545–546, 573–576 enabling, 429–433 Transmission Control editing preferences in, exclusions from, 416–417, Protocol (TCP). see also 549–551 423, 429–431 TCP/IP protocol suite forcibly quitting format of backups in, history of, 579 applications in, 416–417 introduction to, 584 543–544, 561–567 in installation of OS X network communications for general applications, Mavericks, 19, 35 via, 678 542–543 introduction to, 413 Transmit Rate, 656 introduction to, 491, 542 912 Index

Preferences in, 547–551 system file permissions in network issues in, 654 Preview preferences in, Recovery, 344–345 network status in, 655, 568–572 system file permissions 666–667 viewing preferences in, in target disk mode, network traffic in, 549–551 340–341 673–674 Troubleshooting file systems target disk mode, Network Utility for, data recovery in, 324–325 examining files in, 659–664 Disk Utility, repairing 338–340 normal network settings disks in, 326–327 target disk mode for, in, 674 Disk Utility, storage generally, 322–323 observing issues in, 666 inspection in, target disk mode, ping tool for, 661–662, 318–319 repairing partitions/ 667–669 Disk Utility, Verify and volumes in, 334–341 Safari for, 672–673 Repair in, 321–322 target disk mode, starting service issues in, 654, Disk Utility, viewing disk target computers in, 704–708, 723–728 info in, 331–334 335–336 Web access testing in, 673 examining files manually viewing disk info in, Wi-Fi connectivity in, in, 338–340 328–331 656–658 file system permissions volumes in, generally, Troubleshooting systems in, 325–328 321–325 administrator accounts home folder permissions, volumes in, repairing in in, 872–874 repairing, 345–346 Recovery, 341–346 booter in, 860 home folder permissions, volumes in, repairing in firmware in, 859–860 resetting, 327–328 target disk mode, hardware issues in, 859 inspecting file systems in, 334–341 introduction to, 839 317–320 Troubleshooting networks kernels in, 860–861 introduction to, 317 breaking network settings logout in, 855, 863 local storage in, 328–334 in, 665–666 power nap mode in, nonstarting systems in, common issues in, 853–854 324–325 655–658 restart in, 855–856 partition tables/volumes DHCP service issues safe mode login in, 863 in, 337–338 in, 658 safe sleep mode in, partitions in, generally, DNS testing in, 672–673 852–853 321–325 Ethernet connectivity in, shutdown in, partitions in, repairing in 655–656 855–856, 863 Recovery, 341–346 exercises in, single-user mode in, partitions in, repairing generally, 665 868–874 in target disk mode, introduction to, 653–659 sleep modes in, 334–341 local issues in, 654 850–854 starting target computers Lookup for, 662–663, standby mode in, in, 335–336 672–673 852–853 storage in, 318–320 Network Diagnostics for, startup in, 856–858, 659, 669–672 864–868 Index 913

system initialization in, UNIX preparation for, 13–20, 840–846, 858–862 application installation 28–35 system launchd in, in, 454 settings documentation 861–862 CUPS in, 799–802, for, 20 system volume issues in, 836–837 single system partitions 859–860 hidden items in, in, 21 user sessions in, 847–850, generally, 349–350 system disks, preparation 863–864 permissions in, 295–300 of, 20–22 verbose mode in, user accounts and, up-to-date information 869–870 generally, 129 on, 20 Turning off File Vault 2, (UFS), upgrade vs. install 290–291 239–240 options for, 25 Twitter, 680 Unlocking documents, verifying compatibility 522–523 of third-party U Unmounting disks, 250–251, application, 18–19 UDF (Universal Disk 253–254 verifying requirements Format), 240 Updates button, 450 for, 14–20 UDP (User Datagram Updating software. see URLs (Uniform Resource Protocol), 584, 678 software updates Locators), 683, 697 UEFI (Unified Extensible Upgrading to OS X Mavericks Usage, 567 Firmware Interface), Apple software updates USBs (Universal Serial Buses) 841, 843 in, 17 cellular network adapters UFS (UNIX File System), backing up data in, 35 in, 611 239–240 backing up files/ external, 797–798 UIDs (user IDs), 135 folders, 19 introduction to, 610 Unified Extensible Firmware choices for, 24–26 for storage, generally, 235 Interface (UEFI), firmware updates in, versions of, 775–777 841, 843 17–18 User accounts. see also user Uniform Resource Locators installation options sessions (URLs), 683 vs., 25 in Activity Monitor, 540 Uninstallers, 467, 487 installing OS X Mavericks administrative, 131 , 191, 552 after, 38–40 attributes of, 134–136 multiple partitions in, creating managed, 152 (UDF), 240 21–22 deleting, 160 Universal Serial Buses (USBs) network settings examination of, 151–152 cellular network adapters documentation in, fast user switching for, in, 611 34–35 140–143 external, 797–798 on newer Mac in File Vault 2, 275–276 introduction to, 610 systems, 24 guest, 131–132 for storage, generally, 235 OS X Installer for, 23–25 home folders and. see versions of, 775–777 partitioning options in, home folders Universally unique IDs 21–22 (UUIDs), 135 914 Index

in iCloud, creating new, User keychains, 214–215. home folder creation in, 148–150 see also keychain 165–168 in iCloud, linking to management home folder deletion in, existing, 147–148 User Library folders. see also 168–169 introduction to, 129 Library folders login window options in, local group, 133 application containers 138–140 login windows for, in, 369 mounting network shares 138–140 corrupted resources in, 720–721 managed, creating, 152 in, 551 New Admin in, 874 managed, testing, Finder and, 350–351, new permission entries 155–156 359–361 in, 305 management of, preference files in, Parental Controls in, generally, 547–551 153–154 129–136, 144 User names, 178 Password Assistant in, new, creating, 136 User resource domains, 180–181 new, iCloud, 148–150 366–367 resetting passwords new, logging in to, User sessions. see also in, 181–182, 146–147 user accounts 199–201, 207 parental controls in, environment in, 850 restored home folders 136–138, 153–154 introduction to, 847 for new accounts in, passwords for. see login windows in, 171–173 passwords 847–848 restoring home folders in, Preferences for, 150–151 logout in, 863 generally, 164–165 restoring deleted, safe mode login in, 863 restoring original 165–174 shutdown in, 863 passwords in, 289 root, 132 startup of, 840 user account preferences security of, 175–177 troubleshooting, 863–864 in, 133–134 Setup Assistant for, 136 user’s launchd in, virtual displays in, 763 sharing-only, 132 848–850 User’s launchd standard, 130–131, Users & Groups Activity Monitor and, 566 144–146 Administrator Account Dashboard and, 560 testing managed, 155–156 in, 181–182 logout in, 855 troubleshooting, 543, 757 changing passwords restart in, 855–856 types of, 130–133 in, 179 shutdown in, 855–856 Users & Groups for. see checking new user user sessions, 848–850 Users & Groups accounts in, 151–152 Utilities User Datagram Protocol creating standard user Archive Utility, 404 (UDP), 584, 678 accounts in, 144–146 Directory Utility, 176 User documents, 396–397 deleting user accounts Disk. see Disk Utility User home folders, 364. see in, 160 Firmware Password also home folders fast user switching in, Utility, 91, 186, User IDs (UIDs), 135 140–141 208–210 Index 915

Network. see Internet Accounts Volumes Network Utility preferences, 709–710 formats of, 238–239 OS X. see OS X Utilities personal firewall repairing in OS X in OS X Recovery, 88–91, history, 755 Recovery, 341–345 94–98 preferences, 549–551 repairing in target disk UUID keychain folders, 212 systems processes/ mode, 334–341 UUIDs (universally unique usage, 567 troubleshooting, IDs), 135 Virtual displays, 761–763 generally, 321–325 Virtual local area networks VPNs (virtual private V (VLANs), 612 networks) VCards, 433–434 Virtual Network Computing configuration profiles Verbose mode, 869–870 (VNC) protocol, 738–740 for, 618 Verify and Repair, 321–322 Virtual network services, configuring, generally, Verifying installation 611–612 617–618 requirements, 14–20 Virtual private connectivity in, Versions networks (VPNs) 621–622, 646 architecture of, 496–497 configuration profiles introduction to, 612 in document for, 618 manual configuration of, management, configuring, generally, 618–620 501–503, 518–521 617–618 in network configuration, iCloud documents connectivity in, 617–622 and, 508 621–622, 646 settings for, 643–646 working with multiple introduction to, 612 documents in, manual configuration of, W 520–521 618–620 WANs (wide area networks) VGA (Video Graphics in network configuration, history of, 579 Array), 785 617–622 introduction to, 586–587 Video, 784–785, 791 settings for, 643–646 network services in, Video Graphics Array Visibility settings, 397–399 613–614 (VGA), 785 Visible networks, 599–600 Watermarks, 834–835 Viewing VLANs (virtual local area Web access testing, 638, 673 Contacts accounts, networks), 612 Web browsers. see Safari 709–710 VMware Fusion, 611 Web Proxy Autodiscovery diagnostic reports, VNC (Virtual Network Protocol (WPAD), 629 573–574 Computing) protocol, Web-based Distributed disk information, 738–740 Authoring and 328–334 Voice over IP (VoIP), 584 Versioning (WebDAV), file system permissions, VoiceOver, 553–554 693, 699–700 293–295 VoIP (voice over IP), 584 WebDAV (Web-based installed applications, Volume Purchase Distributed Authoring 484–485 Program, 442 and Versioning), 693, 699–700 916 Index

Website cookies, 192 support for, 613 basic Wi-Fi WEP (Wired Equivalent troubleshooting configurations for, Privacy), 594 connectivity of, 592–593 Wide area networks (WANs) 656–658 connecting, generally, history of, 579 verifying connection to, 597–601 introduction to, 586–587 600–601 hardware interfaces network services in, Wi-Fi Protected for, 610 613–614 Access (WPA) Location Services Widgets enterprise authentication and, 191 adding, 558–559 in, 627 locations, creating Wi-Fi in Dashboard, introduction to, 594–595 only, 647–648 generally, 557 in networks, 595 Network settings for, Dashboard processes Wi-Fi Protected Access II 597–604 and, 560 (WPA2) personal area network manually managing, 559 enterprise authentication in, 611 troubleshooting, 560–561 in, 627 Preferred Network lists, Wi-Fi enterprise configuration adding to, 649–650 advanced configurations in, 594–595 Preferred Network lists, for, 647–651 introduction to, 594–595 clearing, 649 AirDrop and, 748–750 Windows, 806 Preferred Network order authentication, 594 Windows Internet Naming in, 651 basic configurations for, Service (WINS) status menu options in, 592–593 in Network preferences, 595–597 connecting to, 597–601 627–629 support for, 613 hardware interfaces support for, 613 troubleshooting, 656–658 for, 610 Windows PCs, 53–54 verifying, 600–601 Location Services WINS (Windows Internet WPA in, 594–595, 627 and, 191 Naming Service) WPA2 in, 594–595, 627 locations, creating Wi-Fi names in, 736 Wireless Diagnostics, 656–658 only, 647–648 in Network preferences, WPA (Wi-Fi Protected Network settings for, 627–629 Access) 597–604 support for, 613 enterprise authentication personal area network Wired Equivalent Privacy in, 627 in, 611 (WEP), 594 introduction to, 594–595 Preferred Network lists, Wireless connectivity in networks, 595 adding to, 649–650 advanced Wi-Fi WPA2 (Wi-Fi Protected Preferred Network lists, configurations for, Access II) clearing, 649 647–651 enterprise authentication Preferred Network order AirDrop and, 748–750 in, 627 in, 651 authentication in, 594 enterprise configuration status menu options, in, 594–595 595–597 introduction to, 594–595 Index 917

WPAD (Web Proxy XQuartz, 457 Zeroconf (Zero Configuration Autodiscovery XTS-AES 128 encryption, 273. Networking), 734 Protocol), 629 see also encryption Zip archives Write Only permissions, 296 creating, 402–403 Y disk images vs., 402 X Yellow status, 655 downloading apps X Window System from, 465 applications, 456–457 Z expanding, 403–404 , 550 Zero Configuration introduction to, 401–402 XML (Extensible Markup Networking Language), 549–550 (Zeroconf), 734