Upgrading to Mac OS X Server Migration Guide
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Mac OS 8 Update
K Service Source Mac OS 8 Update Known problems, Internet Access, and Installation Mac OS 8 Update Document Contents - 1 Document Contents • Introduction • About Mac OS 8 • About Internet Access What To Do First Additional Software Auto-Dial and Auto-Disconnect Settings TCP/IP Connection Options and Internet Access Length of Configuration Names Modem Scripts & Password Length Proxies and Other Internet Config Settings Web Browser Issues Troubleshooting • About Mac OS Runtime for Java Version 1.0.2 • About Mac OS Personal Web Sharing • Installing Mac OS 8 • Upgrading Workgroup Server 9650 & 7350 Software Mac OS 8 Update Introduction - 2 Introduction Mac OS 8 is the most significant update to the Macintosh operating system since 1984. The updated system gives users PowerPC-native multitasking, an efficient desktop with new pop-up windows and spring-loaded folders, and a fully integrated suite of Internet services. This document provides information about Mac OS 8 that supplements the information in the Mac OS installation manual. For a detailed description of Mac OS 8, useful tips for using the system, troubleshooting, late-breaking news, and links for online technical support, visit the Mac OS Info Center at http://ip.apple.com/infocenter. Or browse the Mac OS 8 topic in the Apple Technical Library at http:// tilsp1.info.apple.com. Mac OS 8 Update About Mac OS 8 - 3 About Mac OS 8 Read this section for information about known problems with the Mac OS 8 update and possible solutions. Known Problems and Compatibility Issues Apple Language Kits and Mac OS 8 Apple's Language Kits require an updater for full functionality with this version of the Mac OS. -
Mac OS X Server Administrator's Guide
034-9285.S4AdminPDF 6/27/02 2:07 PM Page 1 Mac OS X Server Administrator’s Guide K Apple Computer, Inc. © 2002 Apple Computer, Inc. All rights reserved. Under the copyright laws, this publication may not be copied, in whole or in part, without the written consent of Apple. The Apple logo is a trademark of Apple Computer, Inc., registered in the U.S. and other countries. Use of the “keyboard” Apple logo (Option-Shift-K) for commercial purposes without the prior written consent of Apple may constitute trademark infringement and unfair competition in violation of federal and state laws. Apple, the Apple logo, AppleScript, AppleShare, AppleTalk, ColorSync, FireWire, Keychain, Mac, Macintosh, Power Macintosh, QuickTime, Sherlock, and WebObjects are trademarks of Apple Computer, Inc., registered in the U.S. and other countries. AirPort, Extensions Manager, Finder, iMac, and Power Mac are trademarks of Apple Computer, Inc. Adobe and PostScript are trademarks of Adobe Systems Incorporated. Java and all Java-based trademarks and logos are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. and other countries. Netscape Navigator is a trademark of Netscape Communications Corporation. RealAudio is a trademark of Progressive Networks, Inc. © 1995–2001 The Apache Group. All rights reserved. UNIX is a registered trademark in the United States and other countries, licensed exclusively through X/Open Company, Ltd. 062-9285/7-26-02 LL9285.Book Page 3 Tuesday, June 25, 2002 3:59 PM Contents Preface How to Use This Guide 39 What’s Included -
Keystroke Recorder Attack on a Client/Server Infrastructure
Keystroke Recorder Attack on a Client/Server Infrastructure Randy Marchany, Tom Wilson VA Tech Computing Center Blacksburg, VA 24060 8/2/96 Abstract This paper describes and analyzes a simple attack on a client/server infrastructure. We had no knowledge of the software being used by the client/server systems but did have moderate knowledge of the Macintosh computer. We built a trojan program that installs keystroke recorder software on target client systems without the owner’s knowledge. The recorder software captured all characters entered by the client software users. The recorder log was then transferred back to a Mac system for analysis. This attack can be Internet or Intranet based. This is a demonstration of the ability of a novice attacker to use sophisticated tools with success on a typcial client/server infrastructure. “No true hacker would ever admit to his peers that he could break into a Mac. What skill is there in that?” -Internet Truism 1.0 Introduction In general, standard PC and Mac operating systems do not employ adequate access controls to prevent anyone from installing unwanted software on the system. This poses one of the greatest threats to a company’s client/server structure. PC’s and Mac’s are vulnerable to a wide range of virus, trojan horse, and socially engineered software attacks. There has been considerable discussion on the security features of the client/server projects. IS staffs have anticipated that network sniffer software would be employed to intercept traffic between the client and server systems. A number of interlocking defenses such as data encryption and subnet isolation are being employed or considered by the IS staffs. -
Macintosh System 7.5 Upgrade Guide 1994.Pdf
Macintosh ••••••••••••••••••••••••••• Upgrade Guide <-»·' c:_ 1 - '--~ I · · ····~ f~··~~ \ ,{"&.--;:... (}.. ... Macintosh • • • Upgrade Guide • Apple Compute.r, Inc. © 1994 Apple Computer, Inc. All rights reserved . Under the copyright laws. this manual may not be copied, in whole or in part. wi thout the written consent of Apple. Your rights to the software are governed by the accompanying soft ware li cense agreement. The Apple logo is a trademark of Apple Computer, Inc., registered in !he U.S. and olher count ries. Use of the "keybomd" Apple logo (Option-Shi 1"1 -K) for commercial purposes witJwut the prior wrillen consenl of Apple may constitule lrademark infringement and unfair compel ilion in violation or federal and state laws. Every efforl has been made to ensure tlult the informati on in this manual is accurate. Apple is not responsib le for printi ng or clerical errors. Apple Computer. Inc. I Infinite Loop Cuperti no. CA 950 14-2084 (408) 996- 10 I0 Apple, the Apple logo, AppleTalk, LaserWritcr, Mac intosh. and PowerBook are trademarks of Apple Computer. Inc., registered in the U.S. and other countries. AppleMail. AppleScri pt. At Ease. Balloon Help, ColorSync, Finder. Plai nTalk, PowerShare, PowerTalk, Quick Draw. QuickTime, and TrucTypc arc trademarks of Apple Computer. Inc. Adobe, Adobe Ill ustrator. Adobe Photoshop. Adobe Type Manager. and PostScript are trademarks of Adobe Systems Incorporated, which may be registered in certain jurisdict ions. Exposure is a registered tmdemark of Preferred Publi shers, Inc. Helvetica and Times are regislered trademarks of Linotype Company. QMS is a registered lrademark of QMS. Inc. Quark X Press is a registered trademark of Quark, Inc. -
Transformation—A Fundamental Idea of Mathematics Education Sebastian Rezat · Mathias Hattermann Andrea Peter-Koop Editors
Transformation—A Fundamental Idea of Mathematics Education Sebastian Rezat · Mathias Hattermann Andrea Peter-Koop Editors Transformation—A Fundamental Idea of Mathematics Education 1 3 Editors Sebastian Rezat Andrea Peter-Koop EIM - Institut für Mathematik Fakultät für Mathematik - IDM Universität Paderborn Universität Bielefeld Paderborn Bielefeld Germany Germany Mathias Hattermann Fakultät für Mathematik - IDM Universität Bielefeld Bielefeld Germany ISBN 978-1-4614-3488-7 ISBN 978-1-4614-3489-4 (eBook) DOI 10.1007/978-1-4614-3489-4 Springer New York Heidelberg Dordrecht London Library of Congress Control Number: 2013955389 © Springer Science+Business Media, LLC 2014 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Exempted from this legal reservation are brief excerpts in connection with reviews or scholarly analysis or material supplied specifically for the purpose of being entered and executed on a computer system, for exclusive use by the purchaser of the work. Duplication of this publication or parts thereof is permitted only under the provisions of the Copyright Law of the Publisher’s location, in its current version, and permission for use must always be obtained from Springer. Permissions for use may be obtained through RightsLink at the Copyright Clearance Center. Violations are liable to prosecution under the respective Copyright Law. The use of general descriptive names, registered names, trademarks, service marks, etc. -
A Puny Performa Chapter
Chapter 15 A Puny Performa Chapter IN THIS CHAPTER: I The baffling history of Performas I What’s different about the Performa I All about At Ease I How to use Apple Backup WHAT’S A PERFORMA? What is a Performa? At one time, you could have said it’s “a Macintosh sold only through consumer stores such as Sears (and not computer stores).” But then Apple began selling them through computer stores, too. OK, so then you might have said, “It’s a Macintosh with specialized system software that makes it easier to use.” But then Apple made the special Performa features standard across all Macs (in System 7.5). At this point, you might have defined a Performa as “a Mac that comes with free software already on the hard drive, such as ClarisWorks, Quicken, America Online, and clip art.” But then Apple introduced products such as the “Quadra 605 bundle” and the PowerBook 190 and 1400 series — you guessed it, non-Performas with that same software pre-installed. So, finally you might have mentioned the last remaining defining charac- teristic of the Performa line: “A Performa is a Mac sold with everything — even a monitor — in one box, for one price.” 511 512 Part II: Secrets of the Machine Until Apple introduced the Performa 6220 and 6400, which are sold with- out monitors. That’s why this is a puny Performa chapter — because there are scarcely any differences left between Performa models and those described in the bulk of this book. In the early days, Performa models essentially corresponded to main- stream Mac models. -
Mac OS X Server Web Technologies Administration for Version 10.4 Or Later
Mac OS X Server Web Technologies Administration For Version 10.4 or Later K Apple Computer, Inc. Apple, the Apple logo, Mac, Mac OS, Macintosh, © 2005 Apple Computer, Inc. All rights reserved. Power Mac, Power Macintosh, WebObjects, and Xserve are trademarks of Apple Computer, Inc., registered in the The owner or authorized user of a valid copy of U.S. and other countries. Finder and Xgrid are Mac OS X Server software may reproduce this trademarks of Apple Computer, Inc. publication for the purpose of learning to use such software. No part of this publication may be reproduced Adobe and PostScript are trademarks of Adobe Systems or transmitted for commercial purposes, such as selling Incorporated. copies of this publication or for providing paid-for support services. Java and all Java-based trademarks and logos are trademarks or registered trademarks of Sun Every effort has been made to ensure that the Microsystems, Inc. in the U.S. and other countries. information in this manual is accurate. Apple Computer, Inc., is not responsible for printing or clerical errors. UNIX is a registered trademark in the United States and other countries, licensed exclusively through Apple X/Open Company, Ltd. 1 Infinite Loop Cupertino, CA 95014-2084 Apache is a trademark of the Apache Software 408-996-1010 Foundation, and is used with permission. www.apple.com Other company and product names mentioned herein The Apple logo is a trademark of Apple Computer, Inc., are trademarks of their respective companies. Mention registered in the U.S. and other countries. Use of the of third-party products is for informational purposes “keyboard” Apple logo (Option-Shift-K) for commercial only and constitutes neither an endorsement nor a purposes without the prior written consent of Apple recommendation. -
Apple Computer, Inc. Records M1007
http://oac.cdlib.org/findaid/ark:/13030/tf4t1nb0n3 No online items Guide to the Apple Computer, Inc. Records M1007 Department of Special Collections and University Archives 1998 Green Library 557 Escondido Mall Stanford 94305-6064 [email protected] URL: http://library.stanford.edu/spc Guide to the Apple Computer, Inc. M1007 1 Records M1007 Language of Material: English Contributing Institution: Department of Special Collections and University Archives Title: Apple Computer, Inc. Records creator: Apple Computer, Inc. Identifier/Call Number: M1007 Physical Description: 600 Linear Feet Date (inclusive): 1977-1998 Abstract: Collection contains organizational charts, annual reports, company directories, internal communications, engineering reports, design materials, press releases, manuals, public relations materials, human resource information, videotapes, audiotapes, software, hardware, and corporate memorabilia. Also includes information regarding the Board of Directors and their decisions. Physical Description: ca. 600 linear ft. Access Open for research; material must be requested at least 36 hours in advance of intended use. As per legal agreement, copies of audio-visual material are only available in the Special Collections reading room unless explicit written permission from the copyright holder is obtained. The Hardware Series is unavailable until processed. For further details please contact Stanford Special Collections ([email protected]). Conditions Governing Use While Special Collections is the owner of the physical and digital items, permission to examine collection materials is not an authorization to publish. These materials are made available for use in research, teaching, and private study. Any transmission or reproduction beyond that allowed by fair use requires permission from the owners of rights, heir(s) or assigns. -
Imac Emergency Handbook
Emergency Handbook Includes troubleshooting, hard disk repair, and software installation information for your iMac K Apple Computer, Inc. © 1998 Apple Computer, Inc. All rights reserved. Under the copyright laws, this manual may not be copied, in whole or in part, without the written consent of Apple. Your rights to the software are governed by the accompanying software license agreement. The Apple logo is a trademark of Apple Computer, Inc., registered in the U.S. and other countries. Use of the “keyboard” Apple logo (Option-Shift-K) for commercial purposes without the prior written consent of Apple may constitute trademark infringement and unfair competition in violation of federal and state laws. Every effort has been made to ensure that the information in this manual is accurate. Apple is not responsible for printing or clerical errors. Apple Computer, Inc. 1 Infinite Loop Cupertino, CA 95014-2084 408-996-1010 http://www.apple.com Apple, the Apple logo, AppleShare, AppleTalk, LaserWriter, Mac, the Mac OS logo, Macintosh, Power Macintosh, QuickDraw, and QuickTime are trademarks of Apple Computer, Inc., registered in the U.S. and other countries. AppleCD, At Ease, Disk First Aid, Extensions Manager, Finder, Foreign File Access, and Macintosh PC Exchange are trademarks of Apple Computer, Inc. ENERGY STAR is a U.S. registered trademark. Helvetica is a registered trademark of Linotype-Hell AG and/or its subsidiaries. PostScript is a trademark of Adobe Systems Incorporated or its subsidiaries and may be registered in certain jurisdictions. PowerPC and the PowerPC logo are trademarks of International Business Machines Corporation, used under license therefrom. -
The System Software Museum
Chapter 6 The System Software Museum IN THIS CHAPTER: I Every system version Apple ever released I The differences between System 7.1 and 7.0.1 I The differences between 7.5, 7.5.1, 7.5.2, 7.5.3, 7.5.5, 7.6, and so on I The SECRETS time line I Mac OS 8 — what’s left of it — explained I Guide to AppleSpeak In a little more than a decade, Apple has served up no fewer than 32 different versions of the Mac operating system. We will attempt in this chapter to guide you on a never-before-attempted journey: We will describe virtually all these permutations of the Mac’s system software, from the short-lived System 1.0 to the sprawling, sophisticated System 7.6. Beyond that we’ll show you exactly what to expect from Apple’s as-yet-unreleased system updates and the still- evolving Mac OS 8. THE SYSTEM SOFTWARE MUSEUM Why create a museum of the Mac’s system software? For one thing, exploring the nitty-gritty of system compatibility may prove valuable to Mac trou- bleshooters. It can be pretty handy to know, for example, that in a pinch you can run an LC II with System 6.0.8, but not 6.0.7. Or that a Quadra 630 can 215 216 Part I: System Software Revealed run System 7.1.2P,but not the nearly identical System 7.1.2. Furthermore, the rash of System 7 varieties has boggled even us. Quick, without looking: What’s the difference between versions 7.1.1, 7.1.2, 7.1.3, and 7.5? And what on Earth was System 7.5.3 Revision 2.1? On a more philosophical level, this retrospective provides a stunning overview of just how far the Mac has come since its introduction. -
Secrets of the Mac
Secrets of the Mac Using Keyboard shortcuts The mouse helped to make computing easy for most people. Actually, though, it could slow you down sometimes for common tasks. To help speed up your work, you should start to use some of the many keyboard shortcuts that perform the same action as certain mouse clicks. There is no secret to many of these shortcuts, as they are written on all of the menus. Below are two example menus. By clicking on the key with the little star next to the space bar and the indicated letter, you can choose that command. The up arrow symbol indicates pressing the shift key first. Note: On a Windows machine, the menus will not indicate the star symbol, but instead will show the ctrl key and the required letter key. Tip: Using these keyboard shortcuts is very useful for saving, opening, quitting, printing, selecting all, cutting, copying and pasting. You should try to put yourself into the habit of using the keyboard for these specific commands. Since it is a good idea to save your work every few minutes, by pressing the appropriate keys, rather than using the mouse, you can save much time in the long run. Secrets of the Mac: 1 Secrets of the Mac Fixing common problems 1. Mac is hung, or nothing at all seems to work a. Force quit the application (depress simultaneously option+apple+esc key). b. Force quit the finder (depress simultaneously option+apple+esc key). c. Reboot computer if a. and b. don’t work (depress control+apple+restart key). -
Apple Confidential 2.0 the Definitive History of the World's Most Colorful
vi Reviewers love Apple Confidential “The Apple story itself is here in all its drama.” New York Times Book Review “An excellent textbook for Apple historians.” San Francisco Chronicle “Written with humor, respect, and care, it absolutely is a must-read for every Apple fan.” InfoWorld “Pretty much irresistible is the only way to describe this quirky, highly detailed and illustrated look at the computer maker’s history.” The Business Reader Review “The book is full of basic facts anyone will appreciate. But it’s also full of interesting extras that Apple fanatics should love.” Arizona Republic “I must warn you. This 268-page book is hard to put down for a MacHead like me, and probably you too.” MacNEWS “You’ll love this book. It’s a wealth of information.” AppleInsider “Rife with gems that will appeal to Apple fanatics and followers of the computer industry.” Amazon.com “Mr. Linzmayer has managed to deliver, within the confines of a single book, just about every juicy little tidbit that was ever leaked from the company.” MacTimes “The most entertaining book about Apple yet to be published.” Booklist i …and readers love it too! “Congratulations! You should be very proud. I picked up Apple Confidential and had a hard time putting it down. Obviously, you invested a ton of time in this. I hope it zooms off the shelves.” David Lubar, Nazareth, PA “I just read Apple Confidentialfrom cover to cover…you have written a great book!” Jason Whong, Rochester, NY “There are few books out there that reveal so much about Apple and in such a fun and entertaining manner.