Multiple requests for a keychain password, login password mismatch, broken keychains, expired certificates, and using the Data Protection keychain.
Category Archive: Technology
How can you tell whether a request for a keychain password is genuine? What about a regular request for password authentication?
Apple has just released an update to XProtect Remediator security software for Catalina or later, bringing it to […]
How to get the most out of System Settings, third-party alternatives, and what to do if you still can’t find the setting you need to change.
I hope that you enjoyed Saturday’s Mac Riddles, episode 215. Here are my solutions to them. 1: Me […]
macOS has two types of keychain, and its tools for working with them, Keychain Access and the command tool security, only work fully with one type.
It can take many hours for files to be downloaded from iCloud. Apps must be able to cope with that, but how well does macOS?
Here are this weekend’s riddles to entertain you through family time, shopping and recreation. 1: Me and a […]
From Cyberdog in 1996, through iTools in 2000, .Mac in 2002, the dreaded MobileMe in 2008, to iCloud in 2012 – a long and sometimes painful journey.
How does macOS track Recent items for apps? In a property list, using a Base-64 encoded Bookmark. Here’s how to decode, resolve and discover their contents.
