Final two stories, of a brother and sister caught in an incestuous relationship, and one of the many widowed Greeks from the Trojan war. Very different paintings hidden away.
Author: hoakley
How good is the new unified log’s privacy? Does it live up to Apple’s goal of designing privacy into the system, or is it easily beaten? And how did passwords leak into the log?
Take some blue glass, grind it, and turn it into paint: Smalt is one of the strangest of pigments. It extensively used until replaced by Prussian Blue in the early 1700s, and is making a comeback.
Changing permissions is straightforward in the Finder or command line. But how would you go about changing a file/folder’s owner or group?
Congratulations to Sarah Edwards for unearthing a security vulnerability in macOS 10.13 High Sierra, in which copies of […]
He returned to one theme repeatedly: reflections in the rippled and turbulent surface of a river.
Waypoints identified for shutdown and startup, login, system sleep and wake, and fast user switching. How to write to the log from a shell script, and accessing the separate installation log. Finally, security and audit.
Realist, Naturalist, or Impressionist? The distinctive landscapes of Thaulow complemented the figurative painting of his friend Christian Krohg.
Formatting log extracts, understanding and selecting the fields to display, predicates to filter an extract, using string search, and top-down search for working with the unified log.
How Vertumnus tried to trick Pomona into loving him, then told her a threatening story. Neither worked: it was being himself that won her in the end.
