Ars Technica has compiled a guide for how to encrypt laptops and phones. There are brief descriptions for all the relevant systems.
Tag: OS X
Choosing Comfort Over Privacy
It looks like Apple “needs” to upload even your unsaved documents to its servers to make the newly introduced Continuity “feature” work.
Also it seems Apple silently uploads names and email addresses of all the people you correspond with–no, not only the ones in your address book–just to have a “consistent” experience when displaying recent addresses.
It scares me how little their customer’s privacy must be worth when they choose (these are not accidental data “leaks”) to silently violate them in order to provide comfort features.
Update 2014-10-30:
It seems there is at least a hidden configuration option to turn this behavior off:
defaults write NSGlobalDomain NSDocumentSaveNewDocumentsToCloud -bool false
Apple’s Spotlight Search Phones Home
OS X Yosemite seems to have gained the feature to “phone home” when you do spotlight searches. It’ll send search terms and your location data to Apple’s servers. Of course it’s perfectly in line with Apple’s recent “trust us, we won’t collect unnecessary data” rhetoric.
[…] Ashkan Soltani, an independent researcher and consultant, confirmed the behavior, labeling it “probably the worst example of ‘privacy by design’ I’ve seen yet.” Users don’t even have to search to give up their privacy. Apple immediately sends the user’s location to the company, according to Soltani.
You can turn it off, but it’s on by default.
Monitor Activity in your OS X Dock
Just found a nice trick on TUAW on how to make the OS X Activity Monitor show graphs in place of its app icon.
Looking Up Crash Reports In OS X
If you find yourself–like me–in the situation that your Mac has crashed and you want to retrieve the crash reports (some call them logs 😉 )? Well, there are basically two ways.
You can look them up with the “Console” tool (find it in
/Applications/Utilities/Console
or with Spotlight). Open the “System Diagnostic Reports” section on the left and find an entry similar to
Kernel_<date>_<your_pc_name>.panic
at the top.
You can also find these reports as text files under
/Library/Logs/DiagnosticReports
with the same names. OS X will open them with the Console tool per default.
Cheers. 😀
Sequel Pro
A friend recommended Sequel Pro as a GUI for MySQL databases. After trying it out for a day I must say I’m pleasantly surprised. 🙂
Make an ISO from a CD/DVD on OS X
I just needed to create an .iso file from a DVD and Disk Utility was no help. 🙁 So I turned to the internet and found my answer on SuperUser. 🙂
hdiutil makehybrid -iso -joliet -o Image.iso /input_path
There are other variants described on the linked page.
Custom CAs everywhere
I recently finished introducing custom CA infrastructure in two instances. Each having two sub CAs, two Servers and a bunch of users. The “create your own CA” part was quite easy after I found a dated but still accurate tutorial. In hindsight it is quite silly why I didn’t do this before.
On the server side I had to make it work on:
- Apache
- Nginx
- Postfix
- Cyrus
- Dovecot
Each expecting its own Format/Packing of certificates, keys and certificate chains. :/
On the client side I had to produce installation and configuration howtos for Windows and OS X and a bunch of popular browsers and email clients. Then there is the “user education” part … this is still in progress, but its looking good.
All in all, I’m happy with the result. 🙂
This Mac Flashback Thingy
Even for those living under a rock it should be evident by now: owning a Mac doesn’t spare you from dealing with malware/viruses/trojans.
There are tools to detect and remove it … it seems I’m fine. 🙂
Get rid of OS X ‘Quarantine Events’
So it seems OS X keeps track of all your downloads (even if you are using the Incognito/Private Browsing mode of your browser).
It stores the information in the following files:
- ~/Library/Preferences/com.apple.LaunchServices.QuarantineEventsV2 on Lion
- ~/Library/Preferences/com.apple.LaunchServices.QuarantineEvents on Snow Leopard
They are SQLite databases and can be manipulated with the right tools.
So to delete all the contents you need to open the file for your version of OS X (Lion in my case).
sqlite ~/Library/Preferences/com.apple.LaunchServices.QuarantineEventsV2
In the SQLite console delete all entries in the one table it contains.
delete from LSQuarantineEvent where 1=1;
This statement works in either file, but if you have Lion you might as well get rid of the old file.
rm ~/Library/Preferences/com.apple.LaunchServices.QuarantineEvents