Mac OS X Server Security Configuration for Version 10.4 Or Later Second Edition

Total Page:16

File Type:pdf, Size:1020Kb

Mac OS X Server Security Configuration for Version 10.4 Or Later Second Edition Mac OS X Server Security Configuration For Version 10.4 or Later Second Edition K Apple Inc. Apple, the Apple logo, Airport, AppleShare, AppleTalk, © 2007 Apple Inc. All rights reserved. FireWire, Keychain, Mac, Macintosh, Mac OS, QuickTime, WebObjects, Xgrid, and Xserve are trademarks of Apple The owner or authorized user of a valid copy of Inc., registered in the U.S. and other countries. Apple Mac OS X Server software may reproduce this Remote Desktop and Finder are trademarks of Apple Inc. publication for the purpose of learning to use such software. No part of this publication may be reproduced Adobe and PostScript are trademarks of Adobe Systems or transmitted for commercial purposes, such as selling Incorporated. copies of this publication or for providing paid-for support services. The Bluetooth® word mark and logos are owned by the Bluetooth SIG, Inc. and any use of such marks by Every effort has been made to ensure that the Apple Inc. is under license. information in this manual is accurate. Apple Inc., is not responsible for printing or clerical errors. Intel and Intel Core are trademarks of Intel Corp. in the U.S. and other countries. Apple 1 Infinite Loop UNIX is a registered trademark in the United States and Cupertino CA 95014-2084 other countries, licensed exclusively through 408-996-1010 X/Open Company, Ltd. www.apple.com Other company and product names mentioned herein The Apple logo is a trademark of Apple Inc., registered are trademarks of their respective companies. Mention in the U.S. and other countries. Use of the “keyboard” of third-party products is for informational purposes Apple logo (Option-Shift-K) for commercial purposes only and constitutes neither an endorsement nor a without the prior written consent of Apple may recommendation. Apple assumes no responsibility with constitute trademark infringement and unfair regard to the performance or use of these products. competition in violation of federal and state laws. 019-0923/02-15-07 2 Contents Preface 15 About This Guide 15 Target Audience 15 What’s New in Version 10.4 16 What’s in This Guide 18 Using This Guide 18 Using Onscreen Help 19 The Mac OS X Server Suite 20 Getting Documentation Updates 21 Getting Additional Information 22 Acknowledgments Chapter 1 23 Introducing Mac OS X Server Security Architecture 24 Security Architecture Overview 24 UNIX Infrastructure 24 Access Permissions 24 Security Framework 25 Layered Security Defense 26 Built-In Security Services 26 Keychain Services 26 Secure Transport Services 26 Certificate, Key, and Trust Services 26 Authorization Services 27 Smart Card Services 27 Directory Services 27 Open Directory Authentication Architecture 28 Policy Management 28 Authorization versus Authentication 29 Network Deployment Considerations 29 Network Isolation 29 Functional Separation 30 Using Accounts Securely 3 Chapter 2 31 Installing Mac OS X Server 31 System Installation Overview 32 Disabling the Open Firmware Password 33 Installing Locally from CD or DVD 34 Installing Remotely from Disks or Images 35 Installing Remotely from the Installation Discs 36 Installing Remotely from an Image 37 Installing from the Command Line 38 Using the installer Command Tool for Installation 38 Using the asr Command Tool for Installation 39 Initializing Server Setup 39 Using Server Assistant 39 Setting Up a Secure Local Server 41 Setting Up a Secure Remote Server 42 Updating System Software 43 Updating from an Internal Software Update Server 43 Updating from Internet-Based Software Update Servers 44 Updating Manually from Installer Packages 45 Verifying the Integrity of Software 45 Repairing Disk Permission 45 Kinds of Permissions 46 POSIX Permissions Overview 46 ACL Permissions Overview 46 Using Disk Utility to Repair Disk Permissions Chapter 3 49 Protecting Hardware and Securing Global System Settings 49 Protecting Hardware 50 Disabling Hardware 51 Removing Mac OS 9 52 Using the Command Line to Remove Mac OS 9 52 Running Mac OS 9 from a CD or DVD 53 Running Mac OS 9 from a Disc Image 54 Securing System Startup 55 Using the Open Firmware Password Application 56 Configuring Open Firmware Settings 58 Using Command-Line Tools to Secure Startup 58 Requiring a Password for Single-User Mode 59 Configuring Access Warnings 59 Enabling Access Warnings for the Login Window 60 Enabling Access Warnings for the Command Line 61 Securing Fast User Switching 61 Displaying a Login Warning Banner 61 Setting a Local Login Warning Banner 4 Contents 62 Setting a Login Warning Banner for Remote Services Chapter 4 63 Securing Local Server Accounts 63 Types of User Accounts 64 General Guidelines for Securing Accounts 64 Defining User IDs 67 Securing Local Nonadministrator Accounts 69 Securing Local Server Administrator Accounts 70 Securing a Local Directory Domain Administrator Account 70 Securing the Local System Administrator Account 71 Restricting sudo Usage 72 Using Strong Authentication 73 Using Password Assistant 74 Using Smart Cards 74 Using Tokens 74 Using Biometrics 75 Storing Credentials 76 Using the Default User Keychain 77 Securing Keychain Items 77 Creating Additional Keychains 79 Using Portable and Network-Based Keychains Chapter 5 81 Securing System Preferences 83 Securing .Mac Preferences 85 Securing Accounts Preferences 88 Securing Appearance Preferences 89 Securing Bluetooth Preferences 90 Securing CDs & DVDs Preferences 90 Securing Classic Preferences 93 Securing Dashboard and Exposé Preferences 94 Securing Date & Time Preferences 95 Securing Desktop & Screen Saver Preferences 97 Securing Displays Preferences 97 Securing Dock Preferences 98 Securing Energy Saver Preferences 99 Securing International Preferences 99 Securing Keyboard & Mouse Preferences 100 Securing Network Preferences 102 Securing Print & Fax Preferences 103 Securing QuickTime Preferences 104 Securing Security Preferences 105 Securing Sharing Preferences 106 Securing Software Update Preferences Contents 5 107 Securing Sound Preferences 108 Securing Speech Preferences 109 Securing Spotlight Preferences 111 Securing Startup Disk Preferences 112 Securing Universal Access Preferences Chapter 6 113 Securing Data and Using Encryption 113 Understanding Permissions 113 Setting POSIX Permissions 114 Viewing POSIX Permissions 114 Interpreting POSIX Permissions 116 Modifying POSIX Permissions 116 Setting File and Folder Flags 116 Viewing Flags 116 Modifying Flags 117 Setting ACL Permissions 117 Setting ACL Permissions Using Workgroup Manager 118 Setting ACL Permissions for a File 119 Setting Global File Permissions 120 Securing Your Home Folder 120 Encrypting Home Folders 121 Using FileVault Master Keychain 122 Centrally Managing FileVault 123 Encrypting Portable Files 123 Creating a New Encrypted Disk Image 125 Creating an Encrypted Disk Image from Existing Data 125 Securely Erasing Data 126 Using Disk Utility to Securely Erase a Disk or Partition 127 Using Command-Line Tools to Securely Erase Files or Folders 127 Using Secure Empty Trash 128 Using Disk Utility to Securely Erase Free Space 128 Using Command-Line Tools to Securely Erase Free Space Chapter 7 129 Securing Accounts, Share Points, and Network Views 129 Open Directory and Active Directory 130 Configuring Share Points 131 Configuring Workgroup Manager for Working with Share Points 131 Disabling Share Points 131 Restricting Access to a Share Point 133 Configuring AFP Share Points 133 Configuring SMB/CIFS Share Points 133 Configuring NFS Share Points 134 Configuring FTP Share Points 6 Contents 135 Controlling Network Views 136 Securing Accounts 136 Configuring User Accounts 138 Configuring Group Accounts 139 Configuring Computer Lists 140 Managing Preferences 141 Understanding Managed Preference Interaction 142 Choosing How to Manage Preferences 143 Setting the Permanence of Management 145 Managing Applications Preferences 146 Managing Classic Preferences 147 Managing Dock Preferences 149 Managing Energy Saver Preferences 150 Managing Finder Preferences 152 Managing Internet Preferences 155 Managing Login Preferences 159 Managing Media Access Preferences 161 Managing Mobility Preferences 163 Managing Network Preferences 165 Managing Printing Preferences 167 Managing Software Update Preferences 168 Managing System Preferences Preferences 169 Disabling Widgets 169 Managing Universal Access Preferences Chapter 8 171 Managing Certificates 171 Understanding Public Key Infrastructure 172 Public and Private Keys 173 Certificates 173 Certificate Authorities 173 Identities 173 Self-Signed Certificates 174 Readying Certificates 174 Using Certificate Manager 175 Requesting a Certificate from a CA 176 Creating a Self-Signed Certificate 176 Importing a Certificate 177 Modifying Certificates 177 Editing a Certificate 178 Deleting a Certificate 178 Creating a Certificate Authority 178 Using Certificate Assistant 178 Creating a CA Using Certificate Assistant Contents 7 180 Creating a CA from the Command Line 180 Signing a Newly Created CA 181 Storing the CA Private Key 181 Creating Folders and Files for SSL 182 Deploying Server Certificates to Clients Chapter 9 183 Setting General Protocols and Access to Services 183 Setting General Protocols 184 Disabling NTP and SNMP 185 Enabling SSH 186 Setting the Server’s Host Name 187 Setting the Date and Time 187 Setting Up Certificates 188 Setting Service Access Privileges Chapter 10 191 Securing Remote Access Services 191 Securing Remote Login 192 Configuring Secure Shell 192 Modifying the SSH Configuration File 194 Generating Key Pairs for Key-Based SSH Connections 195 Updating SSH Key Fingerprints
Recommended publications
  • Beyond BIOS Developing with the Unified Extensible Firmware Interface
    Digital Edition Digital Editions of selected Intel Press books are in addition to and complement the printed books. Click the icon to access information on other essential books for Developers and IT Professionals Visit our website at www.intel.com/intelpress Beyond BIOS Developing with the Unified Extensible Firmware Interface Second Edition Vincent Zimmer Michael Rothman Suresh Marisetty Copyright © 2010 Intel Corporation. All rights reserved. ISBN 13 978-1-934053-29-4 This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold with the understanding that the publisher is not engaged in professional services. If professional advice or other expert assistance is required, the services of a competent professional person should be sought. Intel Corporation may have patents or pending patent applications, trademarks, copyrights, or other intellectual property rights that relate to the presented subject matter. The furnishing of documents and other materials and information does not provide any license, express or implied, by estoppel or otherwise, to any such patents, trademarks, copyrights, or other intellectual property rights. Intel may make changes to specifications, product descriptions, and plans at any time, without notice. Fictitious names of companies, products, people, characters, and/or data mentioned herein are not intended to represent any real individual, company, product, or event. Intel products are not intended for use in medical, life saving, life sustaining, critical control or safety systems, or in nuclear facility applications. Intel, the Intel logo, Celeron, Intel Centrino, Intel NetBurst, Intel Xeon, Itanium, Pentium, MMX, and VTune are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries.
    [Show full text]
  • Notes for Mac Driver 3.2
    Notes for Mac Driver 3.2 June 26, 2014 General Known Issues 1. Issue: Due to an OS limitation, waste toner status shows as unknown. Solution: Check the device for the actual status of the waste toner. 2. Issue: Output appears pixelated when printing from InDesign CS4. Solution: Adobe recommends placing instead of pasting graphics into InDesign and checking your print settings to make sure graphics are printing properly. In the Graphics section of the Print dialog box, choose Send Data > All. 3. Issue: Error “Incorrect account ID” is displayed on the front panel if printing from QuarkXpress 7.3 or later. Solution: Install Quark® CUPS Filter from Quark’s support website. 4. Issue: Watermark may not print correctly in some devices. Solution: Change the Watermark option from “Transparent” to “Stamp”. 5. Issue: Watermark characters may appear as “◻” when printing some PDF documents. Solution: Use a different font for the Watermark text. 6. Issue: Using both N-up and Watermark/Stamp repeat at the same time may significantly reduce printing speed. Solution: Avoid using both settings at the same time. 7. Issues: Driver constraint information is displayed as a pop-up in some Mac OS X versions. Alert message text is generated by OS. 8. Issue: Paper size name changes in OS X 10.7 (by the OS), “Envelope #6” shows as “Personal” and “Statement” shows as “Invoice”. On minor version up, it appears that “Invoice” was reverted to “Statement”. 9. Issue: Mixed orientation file is treated as separate file when Booklet option is applied. 10. Issue: It is possible for multiple applications to open the Account ID List window at the same time which introduces a race condition where multiple applications are allowed to modify the same Account ID List and one will end up over-writing the other’s changes.
    [Show full text]
  • Secure Browser Installation Guide –
    Commercial Online Banking: Corporate First Mid Bank & Trust Commercial Online Banking Secure Browser Installation Guide for Mac Commercial Online Banking: Corporate Commercial Online Banking Secure Browser Commercial Online Banking Secure Browser is a secure solution that helps to provide a hardened stance against fraud. From new client implementation to ongoing support, Secure Browser offers a smooth customer experience. • Secure Site Access with consistent user & device authentication • Not susceptiBle to malware attacks • Prevents misdirection of users to false sites • Reduce risk By avoiding sites with malware • Eliminate hard tokens or 3rd party security products • Data integrity Getting Started - Installation In order to access Commercial Online Banking, users must install the Secure Browser on your PC. First Mid’s Secure Browser is a java-based application that runs on a user’s computer and which provides a captive, safe environment for accessing Commercial Online Banking and other weB sites that are permitted to the company by First Mid Bank & Trust. Secure Browser is a fully self-contained browser that does not use any other internet browser previously installed on a user’s computer, thereby insulating it from any malware that might Be attached to those other browsers. Users are allowed access to only web sites and applications defined and configured by the bank. Secure Browser does not produce an address line, so it is impossible for users to navigate away from entitled sites. All users are required by First Mid Bank & Trust to use the Secure Browser to access Commercial Online Banking. Getting Started • Secure Browser Installation | 2 Commercial Online Banking: Corporate Before You Begin Ensure You Have: • Strong internet connection • Administrative User privileges for the computer Secure Browser is to Be installed.
    [Show full text]
  • Mac OS X Server Administrator's Guide
    034-9285.S4AdminPDF 6/27/02 2:07 PM Page 1 Mac OS X Server Administrator’s Guide K Apple Computer, Inc. © 2002 Apple Computer, Inc. All rights reserved. Under the copyright laws, this publication may not be copied, in whole or in part, without the written consent of Apple. The Apple logo is a trademark of Apple Computer, Inc., registered in the U.S. and other countries. Use of the “keyboard” Apple logo (Option-Shift-K) for commercial purposes without the prior written consent of Apple may constitute trademark infringement and unfair competition in violation of federal and state laws. Apple, the Apple logo, AppleScript, AppleShare, AppleTalk, ColorSync, FireWire, Keychain, Mac, Macintosh, Power Macintosh, QuickTime, Sherlock, and WebObjects are trademarks of Apple Computer, Inc., registered in the U.S. and other countries. AirPort, Extensions Manager, Finder, iMac, and Power Mac are trademarks of Apple Computer, Inc. Adobe and PostScript are trademarks of Adobe Systems Incorporated. Java and all Java-based trademarks and logos are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. and other countries. Netscape Navigator is a trademark of Netscape Communications Corporation. RealAudio is a trademark of Progressive Networks, Inc. © 1995–2001 The Apache Group. All rights reserved. UNIX is a registered trademark in the United States and other countries, licensed exclusively through X/Open Company, Ltd. 062-9285/7-26-02 LL9285.Book Page 3 Tuesday, June 25, 2002 3:59 PM Contents Preface How to Use This Guide 39 What’s Included
    [Show full text]
  • Vmware Fusion 12 Vmware Fusion Pro 12 Using Vmware Fusion
    Using VMware Fusion 8 SEP 2020 VMware Fusion 12 VMware Fusion Pro 12 Using VMware Fusion You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ VMware, Inc. 3401 Hillview Ave. Palo Alto, CA 94304 www.vmware.com © Copyright 2020 VMware, Inc. All rights reserved. Copyright and trademark information. VMware, Inc. 2 Contents Using VMware Fusion 9 1 Getting Started with Fusion 10 About VMware Fusion 10 About VMware Fusion Pro 11 System Requirements for Fusion 11 Install Fusion 12 Start Fusion 13 How-To Videos 13 Take Advantage of Fusion Online Resources 13 2 Understanding Fusion 15 Virtual Machines and What Fusion Can Do 15 What Is a Virtual Machine? 15 Fusion Capabilities 16 Supported Guest Operating Systems 16 Virtual Hardware Specifications 16 Navigating and Taking Action by Using the Fusion Interface 21 VMware Fusion Toolbar 21 Use the Fusion Toolbar to Access the Virtual-Machine Path 21 Default File Location of a Virtual Machine 22 Change the File Location of a Virtual Machine 22 Perform Actions on Your Virtual Machines from the Virtual Machine Library Window 23 Using the Home Pane to Create a Virtual Machine or Obtain One from Another Source 24 Using the Fusion Applications Menus 25 Using Different Views in the Fusion Interface 29 Resize the Virtual Machine Display to Fit 35 Using Multiple Displays 35 3 Configuring Fusion 37 Setting Fusion Preferences 37 Set General Preferences 37 Select a Keyboard and Mouse Profile 38 Set Key Mappings on the Keyboard and Mouse Preferences Pane 39 Set Mouse Shortcuts on the Keyboard and Mouse Preference Pane 40 Enable or Disable Mac Host Shortcuts on the Keyboard and Mouse Preference Pane 40 Enable Fusion Shortcuts on the Keyboard and Mouse Preference Pane 41 Set Fusion Display Resolution Preferences 41 VMware, Inc.
    [Show full text]
  • Mac Mini Server 使用手冊
    Mac mini ͌፣ 1 7 Ԛ͂ Mac OS X Server ໦ଝʑؿ৉ͧ˳ 8 உց੬ؿ Mac mini 9 உց DVD ֶ CD ͳԔ 16 17 ੀԯˢ༅঩˱Ƀ Mac mini ྸرᗐஶ M ac mini ֶԚԯ൬Ƀဣम 20 2 Mac mini ʿؿୂͧک Mac mini 24 ʿؿୂͧ܃ Mac mini 26 28 Ԛ͂ Apple Remote Ⴍઁኂ 30 Յ੡໬೮ 3 Ԛ੬ಲ̳ؒ੒Ԛ͂ M ac mini ؿਐᕀ 36 38 Ԛ͂ႩဲΪ໦ Mac OS X ࠇณΪ໦ச᛽ 41 ԯˢਐᕀ 42 Ԛ͂ Apple Server Diagnostics Internet டᇃؿਐᕀ 42 3 AirPort Extreme ಲᇃ஝঩ؿਐᕀ 45 ྸر௖ณܛᜑச᛽ၐ 46 ৻՗Ҍ୺ʻ౐༅঩רᗐʑࢀdޚԯˢ 46 ؿѵ໔ۂҒˮଐ 50 4 ࠇ߬ؿΪͲ༅঩ 53 ࠇ߬ؿԚ͂༅঩ 56 57 ᐃ໬Ɂ᛽ɮነ ᙶړApple ၤ᏷ྊ 60 61 Regulatory Compliance Information 4 1 1 www.apple.com/tw/macmini Server Assistant Mac mini ؿஉ߮ᜑ੬ॶਪႦᕌΔѧιΪ໦உցcԎ˿˞͓Щ඀նԚ͂eΣ׮੬੣ Ԛ͂༦ Mac minicֶܰྦྷ Mac ཋ຾ɺʪᆃ੪cᇼቇᚾ̯௃ຝؿʑࢀcነୌΣЄ̰ ඀նԚ͂஛஫ཋ຾e cᇼ৻̦ͱቇᚾ੣଱ 53 ࠒکΕੀ Mac mini ؿཋ฻ై፾ైɃཋ฻ై࢔ɾ ՗ΪͲ༅঩eע඀նؿֺτΪ໦႓ ༞ΣЄ Ԛ͂eᇼত੡਄ϣ଱ 2 ௃كॶɰ຤˿ڬߗ੬ܰȹ࠯຤᛻ᔔఒؿԚّ͂c M ac mini ၤ੬ؿ́ݠ໧ؿ༅঩cᐃ໬੬ؿ Mac mini Ԯௐȿ࡚Ԓ˲ॶe ɻҒԷeΣ჏ § Mac¨עஈΛਐᕀؿ໬೮஭˿˞Ε Mac mini ؿ§M ac ႤХ႓ ᗐ༅঩cᇼ਄ቇ଱ 30 ࠒ Յ੡໬೮eޚؿ¨עႤХ႓ Mac OS X Server ৻eרๅௐΡుဳ Mac OS X Serv er ొԜؿֺτڏcԯ܃Εஉց੬ؿ Mac mini ɾ ᗐ༅঩cᇼ਄ቇ Mac OS X Se rver: GettingޚΣ჏உցၤԚ͂ Mac OS X Serv er ؿ ኂச᛽ؿרAdmin Tools CD ͮဥɐeߗ߬ᐃ໬ҡΛЉ כcϽپStarted Ԛ͂Ƀ /ኂ༅฻¨၉ॎ ၉эݯiwww.apple.com/tw/serverר༅঩cᇼ਄ቇ §A pple Љ ʼͧeעmacosx/resourcesɐؿѧኬ႓ ଱ 1 ௃ 7 ȿ˞Ɏୂͧiڃ੬ؿ Mac mini ፭ ᙶᇐeᇼԗ๑ړcᇼͱՅɎֺτཋ຾՗ཋ฻ᔝ౒ኂ̔஫ؿکΕ੬உց Mac mini ɾ Ɏࠍడࠒؿү᜝Ԟ൬Ϸஉցe ᛽˿ॶผɳᒹذສΕɐʿؿיΕ ɐeיۂذᇼɺ߬ੀͨЄ Mac mini AirPort ֶ Bluetooth ® ؿಲᇃ঩໔e 8 ଱ 1 ௃ Mac mini ສѢ๫cԚԯ̳ᆢؿȹࠍ౩ɐcɺ̳߬ࠍ౩ɎeᇼԚ͂י ੀ੬ؿ Mac mini Mac minie כؿཋ฻ᔝ౒ኂcԯˢؿཋ฻ᔝ౒ኂ˿ॶɺሬ͂ڃMac mini ፭ ү᜝ 1i Mac mini ® ଱ 1 ௃ 9 ү᜝ 2i Internet Mac mini DSL ® ੬ؿ Mac mini ৉ௐȿ˿Ԛ͂ಲᇃ၉༏˲ॶؿ AirPort Extreme Ҍ୺eΣ჏உց ชఖ܃cಳ¨עM ac ႤХ႓§ < ¨עᗐ༅঩cᇼፕእ §ႤХ႓ޚಲᇃடᇃؿ §AirPort ¨e 10 ଱ 1 ௃ ү᜝ 3i USB ® ؿ USBێᒄᆚ՗ไལcɺ༦੬˿˞ฆ৉Ԛ͂డ˝ͨЄᗘڃ੬ؿ Mac mini Ԏ̰፭ ᒄᆚ՗ไལeΣ׮੬ؿᒄᆚ৉ௐȿ
    [Show full text]
  • Apple Has Built a Solution Into Every Mac
    Overview Mac OS X iPhone iPod + iTunes Resources Vision Mac OS X solutions VoiceOver from third parties. Browse the wide variety of To make it easier for the blind and those with low-vision to use a accessibility solutions supported computer, Apple has built a solution into every Mac. Called VoiceOver, by Mac OS X. Learn more it’s reliable, simple to learn, and enjoyable to use. In Depth Device Support Application Support Downloads VoiceOver Application Support VoiceOver. A unique solution for the vision-impaired. Every new Mac comes with Mac OS X and VoiceOver installed and includes a variety of accessible More than 50 reasons to use applications. You can also purchase additional Apple and third-party applications to use with VoiceOver. VoiceOver. Learn more While this page lists a few of the most popular applications, many more are available. If you use an application with VoiceOver that’s not on this list, and you would like to have it added, send email to [email protected]. Unlike traditional screen readers, VoiceOver is integrated into the operating system, so you can start using new accessible applications right away. You don’t need to buy an update to VoiceOver, install a new copy, or add the application to a “white list.” Moreover, VoiceOver commands work the same way in every application, so once you learn how to use them, you’ll be able to apply what you know to any accessible application. Apple provides developers with a Cocoa framework that contains common, reusable application components (such as menus, text fields, buttons, and sliders), so developers don’t have to re-create these elements each time they write a new application.
    [Show full text]
  • Dropdmg 3.6.2 Manual
    DropDMG 3.6.2 Manual C-Command Software c-command.com February 16, 2021 Contents 1 Introduction 4 1.1 Feature List..............................................4 2 Installing and Updating 6 2.1 Requirements.............................................6 2.2 Installing DropDMG.........................................7 2.3 Updating From a Previous Version.................................7 2.4 Reinstalling a Fresh Copy......................................8 2.5 Uninstalling DropDMG.......................................9 2.6 Security & Privacy Access......................................9 3 Using DropDMG 13 3.1 Basics................................................. 13 3.2 Making a Bootable Device Image of a Hard Drive......................... 14 3.3 Backing Up Your Files to CD/DVD................................ 16 3.4 Burning Backups of CDs/DVDs................................... 17 3.5 Restoring Files and Disks...................................... 18 3.6 Making Images With Background Pictures............................. 19 3.7 Protecting Your Files With Encryption............................... 20 3.8 Transferring Files Securely...................................... 21 3.9 Sharing Licenses and Layouts.................................... 21 3.10 Splitting a File or Folder Into Pieces................................ 22 3.11 Creating a DropDMG Quick Action................................ 22 4 Menus 23 4.1 The DropDMG Menu........................................ 23 4.1.1 About DropDMG...................................... 23 4.1.2 Software
    [Show full text]
  • Designing PCI Cards and Drivers for Power Macintosh Computers
    Designing PCI Cards and Drivers for Power Macintosh Computers Revised Edition Revised 3/26/99 Technical Publications © Apple Computer, Inc. 1999 Apple Computer, Inc. Adobe, Acrobat, and PostScript are Even though Apple has reviewed this © 1995, 1996 , 1999 Apple Computer, trademarks of Adobe Systems manual, APPLE MAKES NO Inc. All rights reserved. Incorporated or its subsidiaries and WARRANTY OR REPRESENTATION, EITHER EXPRESS OR IMPLIED, WITH No part of this publication may be may be registered in certain RESPECT TO THIS MANUAL, ITS reproduced, stored in a retrieval jurisdictions. QUALITY, ACCURACY, system, or transmitted, in any form America Online is a service mark of MERCHANTABILITY, OR FITNESS or by any means, mechanical, Quantum Computer Services, Inc. FOR A PARTICULAR PURPOSE. AS A electronic, photocopying, recording, Code Warrior is a trademark of RESULT, THIS MANUAL IS SOLD “AS or otherwise, without prior written Metrowerks. IS,” AND YOU, THE PURCHASER, ARE permission of Apple Computer, Inc., CompuServe is a registered ASSUMING THE ENTIRE RISK AS TO except to make a backup copy of any trademark of CompuServe, Inc. ITS QUALITY AND ACCURACY. documentation provided on Ethernet is a registered trademark of CD-ROM. IN NO EVENT WILL APPLE BE LIABLE Xerox Corporation. The Apple logo is a trademark of FOR DIRECT, INDIRECT, SPECIAL, FrameMaker is a registered Apple Computer, Inc. INCIDENTAL, OR CONSEQUENTIAL trademark of Frame Technology Use of the “keyboard” Apple logo DAMAGES RESULTING FROM ANY Corporation. (Option-Shift-K) for commercial DEFECT OR INACCURACY IN THIS purposes without the prior written Helvetica and Palatino are registered MANUAL, even if advised of the consent of Apple may constitute trademarks of Linotype-Hell AG possibility of such damages.
    [Show full text]
  • Chapter 1. Origins of Mac OS X
    1 Chapter 1. Origins of Mac OS X "Most ideas come from previous ideas." Alan Curtis Kay The Mac OS X operating system represents a rather successful coming together of paradigms, ideologies, and technologies that have often resisted each other in the past. A good example is the cordial relationship that exists between the command-line and graphical interfaces in Mac OS X. The system is a result of the trials and tribulations of Apple and NeXT, as well as their user and developer communities. Mac OS X exemplifies how a capable system can result from the direct or indirect efforts of corporations, academic and research communities, the Open Source and Free Software movements, and, of course, individuals. Apple has been around since 1976, and many accounts of its history have been told. If the story of Apple as a company is fascinating, so is the technical history of Apple's operating systems. In this chapter,[1] we will trace the history of Mac OS X, discussing several technologies whose confluence eventually led to the modern-day Apple operating system. [1] This book's accompanying web site (www.osxbook.com) provides a more detailed technical history of all of Apple's operating systems. 1 2 2 1 1.1. Apple's Quest for the[2] Operating System [2] Whereas the word "the" is used here to designate prominence and desirability, it is an interesting coincidence that "THE" was the name of a multiprogramming system described by Edsger W. Dijkstra in a 1968 paper. It was March 1988. The Macintosh had been around for four years.
    [Show full text]
  • Jamf Pro Server
    Jamf Pro Administrator's Guide Version 10.1.0 © copyright 2002-2017 Jamf. All rights reserved. Divide is a trademark or registered trademark of Divide, Inc. Jamf has made all efforts to ensure that this guide is accurate. eDirectory is a trademark of Novell, Inc. in the United States and other countries. Jamf 100 Washington Ave S Suite 1100 Google, Android, Google Chrome, and Google Minneapolis, MN 55401-2155 Play are trademarks or registered trademarks of (612) 605-6625 Google Inc. Intel and McAfee Endpoint Protection are either Under the copyright laws, this publication may registered trademarks or trademarks of the Intel not be copied, in whole or in part, without the Corporation in the United States and other written consent of Jamf. countries. The CASPER SUITE, COMPOSER®, Likewise is a trademark of Likewise Software. the COMPOSER Logo®, Jamf, the Jamf Logo, JAMF SOFTWARE®, the JAMF SOFTWARE Logo®, Linux is a registered trademark of Linus Torvalds RECON®, and the RECON Logo® are registered or in the United States and other countries. common law trademarks of JAMF SOFTWARE, LLC in the U.S. and other countries. Microsoft, Microsoft Intune, Active Directory, Azure, Excel, OneNote, Outlook, PowerPoint, ADmitMac is a registered trademark of Thursby Silverlight, Windows, Windows Server, and all Software Systems, Inc. references to Microsoft software are either registered trademarks or trademarks of Adobe, Adobe AIR, Adobe Bridge, Adobe Microsoft Corporation in the United States Premier Pro, Acrobat, After Effects, Creative and/or other countries. Suite, Dreamweaver, Fireworks, Flash Player, Illustrator, InDesign, Lightroom, Photoshop, Mozilla and Firefox are registered trademarks of Prelude, Shockwave, and all references to Adobe the Mozilla Foundation.
    [Show full text]
  • Speech & Telephony for Web.Qxp
    Alfred’s Teach Yourself Computer Audio Speech and Telephony (Free supplemental chapter, only available at www.alfred.com) TODD SOUVIGNIER Copyright © MMIII by Alfred Publishing Co., Inc. All rights reserved. Alfred Publishing Co., Inc. 16320 Roscoe Blvd., Suite 100 P. O. Box 10003 Van Nuys, CA 91410-0003 www.alfred.com SPEECH AND TELEPHONY What you’ll learn to do in this chapter: •Make your computer react to spoken commands •Make your computer talk back to you •Create a voice print “password” •Do computer-to-computer voice conferencing •Use the computer for phone dialing •Make telephone calls over the Internet The various forms of technology covered in Alfred’s been available to Windows users for many years, but, Teach Yourself Computer Audio can easily be used to until recently, users had to obtain them by way of record, process and play back human speech just as purchasing and installing add-in upgrades of separate well as music or any other sound. Speech is a universal software packages. Apple has also led the field in voice human attribute, so it is no surprise that a number of recognition, allowing users to create system passwords different technologies and applications related to it based upon the unique sound of one’s voice. have arisen on the various computer platforms. In addition to technologies that allow the computer to The popular image of futuristic computing was largely talk or listen, transmission technologies convey the derived from films such as 2001: A Space Odyssey and user’s voice to another location. Many businesses the television series Star Trek.
    [Show full text]