A simple command tool which covers the parts that Spotlight can’t reach. Looking for an elusive command tool? Use locate.
Category Archive: Macs
How good is the new unified log’s privacy? Does it live up to Apple’s goal of designing privacy into the system, or is it easily beaten? And how did passwords leak into the log?
Changing permissions is straightforward in the Finder or command line. But how would you go about changing a file/folder’s owner or group?
Congratulations to Sarah Edwards for unearthing a security vulnerability in macOS 10.13 High Sierra, in which copies of […]
Waypoints identified for shutdown and startup, login, system sleep and wake, and fast user switching. How to write to the log from a shell script, and accessing the separate installation log. Finally, security and audit.
Formatting log extracts, understanding and selecting the fields to display, predicates to filter an extract, using string search, and top-down search for working with the unified log.
How it came about, what Apple’s goals were and their effect on the log contents, how it works, and an overview of the tools available to work with it.
We eradicated smallpox, and are on the verge of doing the same to polio. Simple lessons on naming and communicating extend to macOS malware, and Apple’s role.
Setting permissions in Terminal is simple. This basic introduction explains how to understand the notation used, and save yourself time fiddling in the Finder.
Creating and resolving Finder aliases is straightforward in Swift: here’s how alisma does it.
