How can I tell if my local webserver is configured to accept https requests?

I have phpMyAdmin on my localhost server.
How can I tell if the localhost server is configured to accept https requests? Or is that unnecessary on a localhost server?
Below is the info from the phpMyAdmin home page:
Server: 127.0.0.1 via TCP/IP
Server version: 5.0.81
Protocol version: 10
Apache/2.2.20 (Unix) mod_ssl/2.2.20 OpenSSL/0.9.8r DAV/2 PHP/5.3.6
MySQL client version: mysqlnd 5.0.8-dev - 20102224 - $Revision: 308673 $
PHP extension: mysqli
phpMyAdmin
Version information: 3.3.1
Many thanks for information and advice concerning this.
Best,
Sheley

Well, for one, by definition, localhost can only ever be accessed from the machine itself. It doesn't get any more secure than that.
However, just because you're hitting the site on localhost that doesn't mean that Apache isn't also listening for connections on other IP addresses. In fact, by default, Apache will listen on all IP addresses configured on the machine.
Therefore you might want to look a little deeper.
You can see from the phpMyAdmin output that Apache is configured to support HTTPS, but that only tells you whether apache knows how to speak HTTPS, not whether the current connection/request is using HTTPS.
The shortest, simplest answer to your question is to try. If you can hit https://localhost/ then, yes, Apache is listening and responding to HTTPS requests. If it doesn't respond then it isn't.
Or dig through the configuration files, but I'm guessing if you knew how to do that, you wouldn't be asking the question.

Similar Messages

  • How can i tell if i have extended warranty or not?

    my iphone 4s will not charge and im told that this is covered by extended warranty.  My father has said that we have extended warranty but im not entirely sure if he meant that or apple care.. how can i tell what i actually have

    How to find Warranty Details
    https://selfsolve.apple.com/agreementWarrantyDynamic.do

  • How can I tell if my EMET GPO is in place instead of the local xml file on a computer?

    Hi,
    I did the following commands on my test machine with EMET 5.1 installed:
    emet_conf --delete_all
    emet_conf --refresh
    emet_conf --list
    There were applications that came up but how can I tell if it is really coming from GPO and not the local configuration file that came with EMET 5.1? Am I suppose to see a "greater than symbol" prior to the name of the application or no?
    When I ran rsop.msc on the machine, I can see that my group policy in place.  But I thought I'm suppose to see a greater than symbol (like below) - which means the list of apps are coming from the GPO:
    Executable             Path                                  
    Mitigations
    >7z.exe                *\7-Zip                               
    DEP SEHOP NullPage HeapSpray EAF MandatoryASLR BottomUpASLR
    >7zFM.exe              *\7-Zip                               
    DEP SEHOP NullPage HeapSpray EAF MandatoryASLR BottomUpASLR
    >7zG.exe               *\7-Zip                               
    DEP SEHOP NullPage HeapSpray EAF MandatoryASLR BottomUpASLR
    >Acrobat.exe           *\Adobe\Acrobat 8.0\Acrobat            DEP SEHOP NullPage HeapSpray EAF MandatoryASLR BottomUpASLR
    >Acrobat.exe           *\Adobe\Acrobat 9.0\Acrobat            DEP SEHOP NullPage HeapSpray EAF MandatoryASLR BottomUpASLR
    >Acrobat.exe           *\Adobe\Acrobat 10.0\Acrobat           DEP SEHOP NullPage HeapSpray
    Am I wrong? Is that an EMET 3.1 "thing" only?  Please let me know.
    Thanks!

    Never mind.  I got it.  If you do an "Emet_conf --List" it will turn out something like this that indicates you are getting your policies from GPO

  • How can I tell which apps or programs are open at any time. At a recent visit to the Genius at my local Apple store, the "Genius" told me that too many apps or programs are running in the background. I'm using Mountain Lion on a McBook Pro

    I was told that my Mac has to work extra hard because there are too many apps and/or programs open in the background. How can one tell what is open?? It must be something which is not normally visible to the user??
    Hans

    Thanks, I have looked at that several times but I can't detect any one item which would indicate overusage. The small chart (indicator bars) are much on the low side and the onse which show are basically green? Not sure what the person at the Genius Bar saw so I'm somewhat puzzled.

  • How can I tell if my phone is unlocked?

    Hi,
    I contacted AT&T to unlock my phone (which they did on their end). I then backedup and restored my phone per apple's instructions. How can I tell if it is unlocked? I misssed the screen saying the phone is now unlocked.  AT&T said to call apple and give them the IMEI number, but I can not seem to find a way to do this without paying money.
    I leave for a trip to the UK in a week and I want the option to use a local SIM over there. I would like to figure out if my phone is unlocked as I will not have access to a computer over there. THoughts?

    Try a SIM from any other carrier (borrow one from a friend).
    Contact Apple support and ask them.
    Restore the device again.

  • How can you tell what type of server configuration is installed? is it j2ee or not?

    Before I run an updater, how can I tell if the server is a
    j2ee server configuration or a "regular" server configuration? Its
    on on Linux os...

    My "Settings Summary" shows;
    Server Product ColdFusion MX
    Version 7,0,0,91690
    Edition Enterprise
    Serial Number blah-blah-blah
    Operating System UNIX
    OS Version 2.6.15-1.1833_FC4smp
    JVM Details
    Java Version 1.4.2_05
    Java Vendor Sun Microsystems Inc.
    Java Vendor URL
    http://java.sun.com/
    Java Home /opt/coldfusionmx7/runtime/jre
    Java File Encoding UTF8
    Java Default Locale en_US
    File Separator /
    Path Separator :
    Line Separator Chr(10)
    User Name nobody
    User Home /
    User Dir /opt/coldfusionmx7/runtime/bin
    Java VM Specification Version 1.0
    Java VM Specification Vendor Sun Microsystems Inc.
    Java VM Specification Name Java Virtual Machine Specification
    Java VM Version 1.4.2_05-b04
    Java VM Vendor Sun Microsystems Inc.
    Java VM Name Java HotSpot(TM) Server VM
    Java Specification Version 1.4
    Java Specification Vendor Sun Microsystems Inc.
    Java Specification Name Java Platform API Specification
    Java Class Version 48.0
    --> and lots more, but no mention whether its a J2EE
    configued server or not...so should I assume its not a
    regular/non-J2EE server?
    I ask because the Updaters instructions show a BIG difference
    depending on which type it is to be updated...thanx...Matt

  • How can I tell if data was transferred to my MacBook Pro after the Migration Assistant process was stopped?

    I began Migration Assistant and after about 4hrs into the transfer I decided to quit. How do I find out if any data was transferred to my Macbook Pro from my Windows 7 pc?

    iMac Obsessed wrote:
    I've had my MacBook Pro Retina since the 17th and am only now realising that my firewall was not on. I've already connected to a network via ethernet at my job so that I can have access to the internet. How can I tell if my personal info is safe?
    As long as you are behind a router, you don't need to have your firewall turned on at all, in fact it probably slows your computer and/or internet connection down a bit. The only time you need it is to either protect yourself against intrusion from others on your local network or if you hook your computer directly to a cable / DSL modem. See Thomas Reed's Do I Need a Firewall?

  • HT4356 How can I tell if my AirPrint printer is on the same network as my router

    How can I tell if my printer is on the same network as my wireless router

    iMac Obsessed wrote:
    I've had my MacBook Pro Retina since the 17th and am only now realising that my firewall was not on. I've already connected to a network via ethernet at my job so that I can have access to the internet. How can I tell if my personal info is safe?
    As long as you are behind a router, you don't need to have your firewall turned on at all, in fact it probably slows your computer and/or internet connection down a bit. The only time you need it is to either protect yourself against intrusion from others on your local network or if you hook your computer directly to a cable / DSL modem. See Thomas Reed's Do I Need a Firewall?

  • How can I tell if someone is hacking/keystroking?

    All of my iPhoto disappeared, photo library gone.  Nothing in trash.  Reasons happening in addition to this that lead me to believe I've been hacked.  How can I tell?  How can I find and restore photos?  How do I know if keystroke is on my computer, etc.?  The following is "GREEK to me"
    Last login: Wed Dec 18 23:19:15 on ttys000
    Sarah-MacBook-Pro:~ mckennafamily777$ kextstat -kl | awk '!/com\.apple/{printf "%s %s\n", $6, $7}'
    Sarah-MacBook-Pro:~ mckennafamily777$ sudo launchctl list | sed 1d | awk '!/0x|com\.(apple|openssh|vix)|edu\.mit|org\.(amavis|apache|cups|isc|ntp|postfi x|x)/{print $3}'
    WARNING: Improper use of the sudo command could lead to data loss
    or the deletion of important system files. Please double-check your
    typing when using sudo. Type "man sudo" for more information.
    To proceed, enter your password, or type Ctrl-C to abort.
    Password:
    com.oracle.java.Helper-Tool
    com.microsoft.office.licensing.helper
    com.adobe.fpsaud
    Sarah-MacBook-Pro:~ mckennafamily777$ launchctl list | sed 1d | awk '!/0x|com\.apple|edu\.mit|org\.(x|openbsd)/{print $3}'
    com.oracle.java.Java-Updater
    Sarah-MacBook-Pro:~ mckennafamily777$ ls -1A /e*/mach* {,/}L*/{Ad,Compon,Ex,Fram,In,Keyb,La,Mail/Bu,P*P,Priv,Qu,Scripti,Servi,Spo,Sta} * L*/Fonts 2> /dev/null
    /Library/Components:
    /Library/Extensions:
    /Library/Frameworks:
    AEProfiling.framework
    AERegistration.framework
    AudioMixEngine.framework
    NyxAudioAnalysis.framework
    PluginManager.framework
    iTunesLibrary.framework
    /Library/Input Methods:
    /Library/Internet Plug-Ins:
    Flash Player.plugin
    JavaAppletPlugin.plugin
    Quartz Composer.webplugin
    QuickTime Plugin.plugin
    SharePointBrowserPlugin.plugin
    SharePointWebKitPlugin.webplugin
    flashplayer.xpt
    nsIQTScriptablePlugin.xpt
    /Library/Keyboard Layouts:
    /Library/LaunchAgents:
    com.oracle.java.Java-Updater.plist
    /Library/LaunchDaemons:
    com.adobe.fpsaud.plist
    com.apple.remotepairtool.plist
    com.microsoft.office.licensing.helper.plist
    com.oracle.java.Helper-Tool.plist
    /Library/PreferencePanes:
    Flash Player.prefPane
    JavaControlPanel.prefPane
    /Library/PrivilegedHelperTools:
    com.microsoft.office.licensing.helper
    /Library/QuickLook:
    iWork.qlgenerator
    /Library/QuickTime:
    AppleIntermediateCodec.component
    AppleMPEG2Codec.component
    CamTwist.component
    /Library/ScriptingAdditions:
    /Library/Spotlight:
    Microsoft Office.mdimporter
    iWork.mdimporter
    /Library/StartupItems:
    /etc/mach_init.d:
    /etc/mach_init_per_login_session.d:
    /etc/mach_init_per_user.d:
    Library/Address Book Plug-Ins:
    Library/Fonts:
    Library/Input Methods:
    .localized
    Library/Internet Plug-Ins:
    Library/Keyboard Layouts:
    Library/LaunchAgents:
    com.apple.AddressBook.ScheduledSync.PHXCardDAVSource.D2D97456-F3F1-43ED-A067-6D1 50643E9CA.plist
    com.apple.CSConfigDotMacCert-mckennafamily777@me.com-SharedServices.Agent.plist
    Library/PreferencePanes:
    Sarah-MacBook-Pro:~ mckennafamily777$ osascript -e 'tell application "System Events" to get name of every login item' 2> /dev/null
    iTunesHelper, SpeechSynthesisServer, MenuTab for Facebook, AirServer, TuneupMyMac
    Sarah-MacBook-Pro:~ mckennafamily777$
    Next terminal session to disable air drop
    Sarah-MacBook-Pro:~ mckennafamily777$     defaults write com.apple.NetworkBrowser DisableAirDrop -bool YES
    Sarah-MacBook-Pro:~ mckennafamily777$

    Applications > Utilities > Airport Admin Utility
    Select your Airport Base Station > Configure > Airport Tab
    Change Wireless Security
    Wireless Security Change to WPA
    Choose a password which is at least eight characters long and perferably at least twenty and consists of letters and numbers like this
    gh5ls9irth1278dhtu6w8jf9923j9ds
    Click Ok
    Click Update
    You will be asked for a password the next time you use your wireless network enter the password you created.
    Your wireless network is now secure (for all intents and purposes) against any known hacking.
    iFelix

  • PLEASE HELP! How can I tell if my Imac has been hacked?

    PLEASE HELP! How can I tell if my Imac has been hacked? I see a few people have asked this question but the responses tended to be advice on what to do once you've been hacked, not what can done to find out if you have been hacked. I have a late 2012 model imac. My sharing was off and remote logging was off. I use an external router that send wireless to about 4 consoles in the flat. I don't think I have any firewalls up (now looking like a mistake). I think I'm possibly being hacked  due to abnormal behaviour and most recently my camera was turned off all day (no LED) then I went to record something on Photo Booth, the application popped up displaying an image of me getting dressed (nightmare!) which happened hours earlier when the camera was off. This image quickly then disappeared and the camera began working normally. Very strange and alarming. Please help me. Any advice would be very much appreciated. Thanks.

    1. This procedure is a diagnostic test. It changes nothing, for better or worse, and therefore will not, in itself, solve the problem. But with the aid of the test results, the solution may take a few minutes, instead of hours or days.
    Don't be put off merely by the seeming complexity of these instructions. The process is much less complicated than the description. You do harder tasks with the computer all the time.
    2. If you don't already have a current backup, back up all data before doing anything else. The backup is necessary on general principle, not because of anything in the test procedure. Backup is always a must, and when you're having any kind of trouble with the computer, you may be at higher than usual risk of losing data, whether you follow these instructions or not.
    There are ways to back up a computer that isn't fully functional. Ask if you need guidance.
    3. Below are instructions to run a UNIX shell script, a type of program. All it does is to collect information about the state of the computer. That information goes nowhere unless you choose to share it. However, you should be cautious about running any kind of program (not just a shell script) at the behest of a stranger. If you have doubts, search this site for other discussions in which this procedure has been followed without any report of ill effects. If you can't satisfy yourself that the instructions are safe, don't follow them. Ask for other options.
    Here's a summary of what you need to do, if you choose to proceed:
    Copy a line of text in this window to the Clipboard.
    Paste into the window of another application.
    Wait for the test to run. It usually takes a few minutes.
    Paste the results, which will have been copied automatically, back into a reply on this page.
    The sequence is: copy, paste, wait, paste again. You don't need to copy a second time. Details follow.
    4. You may have started the computer in "safe" mode. Preferably, these steps should be taken in “normal” mode, under the conditions in which the problem is reproduced. If the system is now in safe mode and works well enough in normal mode to run the test, restart as usual. If you can only test in safe mode, do that.
    5. If you have more than one user, and the one affected by the problem is not an administrator, then please run the test twice: once while logged in as the affected user, and once as an administrator. The results may be different. The user that is created automatically on a new computer when you start it for the first time is an administrator. If you can't log in as an administrator, test as the affected user. Most personal Macs have only one user, and in that case this section doesn’t apply. Don't log in as root.
    6. The script is a single long line, all of which must be selected. You can accomplish this easily by triple-clicking anywhere in the line. The whole line will highlight, though you may not see all of it in the browser window, and you can then copy it. If you try to select the line by dragging across the part you can see, you won't get all of it.
    Triple-click anywhere in the line of text below on this page to select it:
    PATH=/usr/bin:/bin:/usr/sbin:/sbin:/usr/libexec;clear;cd;p=(Software Hardware Memory Diagnostics Power FireWire Thunderbolt USB Fonts 51 4 1000 25 5120 KiB/s 1024 85 \\b%% 20480 1 MB/s 25000 ports 'com.autodesk.AutoCad com.evenflow.dropbox com.google.GoogleDrive' DYLD_INSERT_LIBRARIES\ DYLD_LIBRARY_PATH -86 ` route -n get default|awk '/e:/{print $2}' ` 25 N\\/A down up 102400 25600 recvfrom sendto CFBundleIdentifier 25 25 25 1000 MB );N5=${#p[@]};p[N5]=` networksetup -listnetworkserviceorder|awk ' NR>1 { sub(/^\([0-9]+\) /,"");n=$0;getline;} $NF=="'${p[26]}')" { sub(/.$/,"",$NF);print n;exit;} ' `;f=('\n%s: %s\n' '\n%s\n\n%s\n' '\nRAM details\n%s\n' %s\ %s '%s\n-\t%s\n' );S0() { echo ' { q=$NF+0;$NF="";u=$(NF-1);$(NF-1)="";gsub(/^ +| +$/,"");if(q>='${p[$1]}') printf("%s (UID %s) is using %s '${p[$2]}'",$0,u,q);} ';};s=(' /^ *$|CSConfigDot/d;s/^ */  /;s/[-0-9A-Fa-f]{22,}/UUID/g;s/(ochat)\.[^.]+(\..+)/\1\2/;/Shared/!s/\/Users\/[^/]+/~/g ' ' s/^ +//;5p;6p;8p;12p;' ' {sub(/^ +/,"")};NR==6;NR==13&&$2<'${p[10]} ' 1s/://;3,6d;/[my].+:/d;s/^ {4}//;H;${ g;s/\n$//;/s: [^EO]|x([^08]|02[^F]|8[^0])/p;} ' ' 5h;6{ H;g;/P/!p;} ' ' ($1~/^Cy/&&$3>'${p[11]}')||($1~/^Cond/&&$2!~/^N/) ' ' /:$/{ N;/:.+:/d;s/ *://;b0'$'\n'' };/^ *(V.+ [0N]|Man).+ /{ s/ 0x.... //;s/[()]//g;s/(.+: )(.+)/ (\2)/;H;};$b0'$'\n'' d;:0'$'\n'' x;s/\n\n//;/Apple[ ,]|Intel|SMSC/d;s/\n.*//;/\)$/p;' ' s/^.*C/C/;H;${ g;/No th|pms/!p;} ' '/= [^GO]/p' '{$1=""};1' ' /Of/!{ s/^.+is |\.//g;p;} ' ' $0&&!/ / { n++;print;} END { if(n<200) print "com.apple.";} ' ' $3~/[0-9]:[0-9]{2}$/ { gsub(/:[0-9:a-f]{14}/,"");} { print|"tail -n'${p[12]}'";} ' ' NR==2&&$4<='${p[13]}' { print $4;} ' ' END { $2/=256;if($2>='${p[15]}') print int($2) } ' ' NR!=13{next};{sub(/[+-]$/,"",$NF)};'"`S0 21 22`" 'NR!=2{next}'"`S0 37 17`" ' NR!=5||$8!~/[RW]/{next};{ $(NF-1)=$1;$NF=int($NF/10000000);for(i=1;i<=3;i++){$i="";$(NF-1-i)="";};};'"`S0 19 20`" 's:^:/:p' '/\.kext\/(Contents\/)?Info\.plist$/p' 's/^.{52}(.+) <.+/\1/p' ' /Launch[AD].+\.plist$/ { n++;print;} END { if(n<200) print "/System/";} ' '/\.xpc\/(Contents\/)?Info\.plist$/p' ' NR>1&&!/0x|\.[0-9]+$|com\.apple\.launchctl\.(Aqua|Background|System)$/ { print $3;} ' ' /\.(framew|lproj)|\):/d;/plist:|:.+(Mach|scrip)/s/:[^:]+//p ' '/root/p' ' !/\/Contents\/.+\/Contents|Applic|Autom|Frameworks/&&/Lib.+\/Info.plist$/ { n++;print;} END { if(n<1000) print "/System/";} ' '/^\/usr\/lib\/.+dylib$/p' ' /Temp|emac/d;/(etc|Preferences)\//s/^\.\/[^/]+//p;' ' /\/(Contents\/.+\/Contents|Frameworks)\/|\.wdgt\/.+\.([bw]|plu)/d;p;' 's/\/(Contents\/)?Info.plist$//;p' ' { gsub("^| ","||kMDItem'${p[35]}'=");sub("^.."," ") };1 ' p '{print $3"\t"$1}' 's/\'$'\t''.+//p' 's/1/On/p' '/Prox.+: [^0]/p' '$2>'${p[9]}'{$2=$2-1;print}' ' BEGIN { i="'${p[26]}'";M1='${p[16]}';M2='${p[18]}';M3='${p[31]}';M4='${p[32]}';} !/^A/ { next;} /%/ { getline;if($5<M1) a="user "$2"%, system "$4"%";} /disk0/&&$4>M2 { b=$3" ops/s, "$4" blocks/s";} $2==i { if(c) { d=$3+$4+$5+$6;next;};if($4>M3||$6>M4) c=int($4/1024)" in, "int($6/1024)" out";} END { if(a) print "CPU: "a;if(b) print "I/O: "b;if(c) print "Net: "c" (KiB/s)";if(d) print "Net errors: "d" packets/s";} ' ' /r\[0\] /&&$NF!~/^1(0|72\.(1[6-9]|2[0-9]|3[0-1])|92\.168)\./ { print $NF;exit;} ' ' !/^T/ { printf "(static)";exit;} ' '/apsd|OpenD/!s/:.+//p' ' (/k:/&&$3!~/(255\.){3}0/ )||(/v6:/&&$2!~/A/ ) ' ' $1~"lR"&&$2<='${p[25]}';$1~"li"&&$3!~"wpa2";' ' BEGIN { FS=":";} { n=split($3,a,".");sub(/_2[01].+/,"",$3);print $2" "$3" "a[n]" "$1;b=b$1;} END { if(b) print("\n\t* Code injection");} ' ' NR!=4{next} {$NF/=10240} '"`S0 27 14`" ' END { if($3~/[0-9]/)print$3;} ' ' BEGIN { L='${p[36]}';} !/^[[:space:]]*(#.*)?$/ { l++;if(l<=L) f=f"\n  "$0;} END { F=FILENAME;if(!F) exit;if(!f) f="\n  [N/A]";"file -b "F|getline T;if(T!~/^(AS.+ (En.+ )?text$|POSIX sh.+ text ex)/) F=F" ("T")";printf("\nContents of %s\n%s\n",F,f);if(l>L) printf("\n  ...and %s more line(s)\n",l-L);} ' ' /^ +[NP].+ =/h;/^( +D.+[{]|[}])/{ g;s/.+= //p;};' ' /^ +B/{ s/.+= |(-[0-9]+)?\.s.+//g;p;} ' ' END{print NR} ' ' /id: N|te: Y/{i++} END{print i} ' ' / / { print "'"${p[28]}"'";exit;};1;' '/ en/!s/\.//p' ' NR!=13{next};{sub(/[+-M]$/,"",$NF)};'"`S0 39 40`" ' $10~/\(L/&&$9!~"localhost" { sub(/.+:/,"",$9);print $1": "$9;} ' '/^ +r/s/.+"(.+)".+/\1/p' 's/(.+\.wdgt)\/(Contents\/)?Info\.plist$/\1/p' 's/^.+\/(.+)\.wdgt$/\1/p' 's/0/Off/p' );c1=(system_profiler pmset\ -g nvram fdesetup find syslog df vm_stat sar ps sudo\ crontab sudo\ iotop top pkgutil PlistBuddy whoami cksum kextstat launchctl sudo\ launchctl crontab 'sudo defaults read' stat lsbom mdfind ' for i in ${p[24]};do ${c1[18]} ${c2[27]} $i;done;' defaults\ read scutil sudo\ dtrace sudo\ profiles sed\ -En awk /S*/*/P*/*/*/C*/*/airport networksetup mdutil sudo\ lsof test );c2=(com.apple.loginwindow\ LoginHook '-c Print /L*/P*/loginw*' '-c Print L*/P*/*loginit*' '-c Print L*/Saf*/*/E*.plist' '~ $TMPDIR.. \( -flags +sappnd,schg,uappnd,uchg -o ! -user $UID -o ! -perm -600 \)' '.??* -path .Trash -prune -o -type d -name *.app -print -prune' '-c Print\ :'${p[35]}' 2>&1' '-c Print\ :Label 2>&1' '{/,}L*/{Con,Pref}* -type f ! -size 0 -name *.plist -exec plutil -s {} \;' "-f'%N: %l' Desktop L*/Keyc*" therm sysload boot-args status " -F '\$Time \$Message' -k Sender kernel -k Message Req 'Beac|caug|dead[^bl]|FAIL|fail|GPU |hfs: Ru|inval|jnl:|last value [1-9]|n Cause: -|NVDA\(|pagin|proc: t|Roamed|rror|ssert|Thrott|tim(ed? ?|ing )o|WARN' -k Message Rne 'Goog|ksadm|SMC:' -o -k Sender fseventsd -k Message Req 'SL' " '-du -n DEV -n EDEV 1 10' 'acrx -o comm,ruid,%cpu' '-t1 10 1' '-f -pfc /var/db/r*/com.apple.*.{BS,Bas,Es,OSXU,Rem,up}*.bom' '{/,}L*/Lo*/Diag* -type f -regex .\*[cgh] ! -name *ag \( -exec grep -lq "^Thread c" {} \; -exec printf \* \; -o -true \) -execdir stat -f:%Sc:%N -t%F {} \;|sort -t: -k2 |tail -n'${p[38]} '-L {/{S*/,},}L*/Lau* -type f' '-L /{S*/,}L*/StartupItems -type f -exec file {} +' '-L /S*/L*/{C*/Sec*A,E}* {/,}L*/{A*d,Ca*/*/Ex,Compon,Ex,In,iTu,Keyb,Mail/B,P*P,Qu*T,Scripti,Sec,Servi,Spo,Widg}* -type f -name Info.plist' '/usr/lib -type f -name *.dylib' `awk "${s[31]}"<<<${p[23]}` "/e*/{auto,{cron,fs}tab,hosts,{[lp],sy}*.conf,pam.d,ssh{,d}_config,*.local} {,/usr/local}/etc/periodic/*/* /L*/P*{,/*}/com.a*.{Bo,sec*.ap}*t .launchd.conf" list getenv /Library/Preferences/com.apple.alf\ globalstate --proxy '-n get default' -I --dns -getdnsservers\ "${p[N5]}" -getinfo\ "${p[N5]}" -P -m\ / '' -n1 '-R -l1 -n1 -o prt -stats command,uid,prt' '--regexp --only-files --files com.apple.pkg.*|sort|uniq' -kl -l -s\ / '-R -l1 -n1 -o mem -stats command,uid,mem' -i4TCP:0-1023 com.apple.dashboard\ layer-gadgets '-d /L*/Mana*/$USER&&echo On' '-app Safari WebKitDNSPrefetchingEnabled' );N1=${#c2[@]};for j in {0..8};do c2[N1+j]=SP${p[j]}DataType;done;N2=${#c2[@]};for j in 0 1;do c2[N2+j]="-n ' syscall::'${p[33+j]}':return { @out[execname,uid]=sum(arg0) } tick-10sec { trunc(@out,1);exit(0);} '";done;l=(Restricted\ files Hidden\ apps 'Elapsed time (s)' POST Battery Safari\ extensions Bad\ plists 'High file counts' User Heat System\ load boot\ args FileVault Diagnostic\ reports Log 'Free space (MiB)' 'Swap (MiB)' Activity 'CPU per process' Login\ hook 'I/O per process' Mach\ ports kexts Daemons Agents launchd Startup\ items Admin\ access Root\ access Bundles dylibs Apps Font\ issues Inserted\ dylibs Firewall Proxies DNS TCP/IP Wi-Fi Profiles Root\ crontab User\ crontab 'Global login items' 'User login items' Spotlight Memory Listeners Widgets Parental\ Controls Prefetching );N3=${#l[@]};for i in 0 1 2;do l[N3+i]=${p[5+i]};done;N4=${#l[@]};for j in 0 1;do l[N4+j]="Current ${p[29+j]}stream data";done;A0() { id -G|grep -qw 80;v[1]=$?;((v[1]==0))&&sudo true;v[2]=$?;v[3]=`date +%s`;clear >&-;date '+Start time: %T %D%n';};for i in 0 1;do eval ' A'$((1+i))'() { v=` eval "${c1[$1]} ${c2[$2]}"|'${c1[30+i]}' "${s[$3]}" `;[[ "$v" ]];};A'$((3+i))'() { v=` while read i;do [[ "$i" ]]&&eval "${c1[$1]} ${c2[$2]}" \"$i\"|'${c1[30+i]}' "${s[$3]}";done<<<"${v[$4]}" `;[[ "$v" ]];};A'$((5+i))'() { v=` while read i;do '${c1[30+i]}' "${s[$1]}" "$i";done<<<"${v[$2]}" `;[[ "$v" ]];};';done;A7(){ v=$((`date +%s`-v[3]));};B2(){ v[$1]="$v";};for i in 0 1;do eval ' B'$i'() { v=;((v['$((i+1))']==0))||{ v=No;false;};};B'$((3+i))'() { v[$2]=`'${c1[30+i]}' "${s[$3]}"<<<"${v[$1]}"`;} ';done;B5(){ v[$1]="${v[$1]}"$'\n'"${v[$2]}";};B6() { v=` paste -d: <(printf "${v[$1]}") <(printf "${v[$2]}")|awk -F: ' {printf("'"${f[$3]}"'",$1,$2)} ' `;};B7(){ v=`grep -Fv "${v[$1]}"<<<"$v"`;};C0(){ [[ "$v" ]]&&echo "$v";};C1() { [[ "$v" ]]&&printf "${f[$1]}" "${l[$2]}" "$v";};C2() { v=`echo $v`;[[ "$v" != 0 ]]&&C1 0 $1;};C3() { v=`sed -E "$s"<<<"$v"`&&C1 1 $1;};for i in 1 2;do for j in 2 3;do eval D$i$j'(){ A'$i' $1 $2 $3; C'$j' $4;};';done;done;{ A0;A2 0 $((N1+1)) 2;C0;A1 0 $N1 1;C0;B0;C2 27;B0&&! B1&&C2 28;D12 15 37 25 8;A1 0 $((N1+2)) 3;C0;D13 0 $((N1+3)) 4 3;D23 0 $((N1+4)) 5 4;for i in 0 1 2;do D13 0 $((N1+5+i)) 6 $((N3+i));done;D13 1 10 7 9;D13 1 11 8 10;D22 2 12 9 11;D12 3 13 10 12;D23 4 19 44 13;D23 5 14 12 14;D22 6 36 13 15;D22 7 37 14 16;D23 8 15 38 17;D22 9 16 16 18;B1&&{ D22 11 17 17 20;for i in 0 1;do D22 28 $((N2+i)) 45 $((N4+i));done;};D22 12 44 54 45;D22 12 39 15 21;A1 13 40 18;B2 4;B3 4 0 19;A3 14 6 32 0;B4 0 5 11;A1 17 41 20;B7 5;C3 22;B4 4 6 21;A3 14 7 32 6;B4 0 7 11;B3 4 0 22;A3 14 6 32 0;B4 0 8 11;B5 7 8;B1&&{ A2 19 26 23;B7 7;C3 23;};A2 18 26 23;B7 7;C3 24;A2 4 20 21;B7 6;B2 9;A4 14 7 52 9;B2 10;B6 9 10 4;C3 25;D13 4 21 24 26;B4 4 12 26;B3 4 13 27;A1 4 22 29;B7 12;B2 14;A4 14 6 52 14;B2 15;B6 14 15 4;B3 0 0 30;C3 29;A1 4 23 27;B7 13;C3 30;D13 24 24 32 31;D13 25 37 32 33;A1 23 18 28;B2 16;A2 16 25 33;B7 16;B3 0 0 34;B2 21;A6 47 21&&C0;B1&&{ D13 21 0 32 19;D13 10 42 32 40;D22 29 35 46 39;};D23 14 1 48 42;D12 34 43 53 44;D22 0 $((N1+8)) 51 32;D13 4 8 41 6;D12 26 28 35 34;D13 27 29 36 35;A2 27 32 39&&{ B2 19;A2 33 33 40;B2 20;B6 19 20 3;};C2 36;D23 33 34 42 37;B1&&D23 35 45 55 46;D23 32 31 43 38;D12 36 47 32 48;D13 20 42 32 41;D13 14 2 48 43;D13 4 5 32 1;D22 4 4 50 0;D13 14 3 49 5;D12 26 48 59 49;B3 4 22 57;A1 26 46 56;B7 22;B3 0 0 58;C3 47;D23 22 9 37 7;A7;C2 2;} 2>/dev/null|pbcopy;exit 2>&-
    Copy the selected text to the Clipboard by pressing the key combination command-C.
    7. Launch the built-in Terminal application in any of the following ways:
    Enter the first few letters of its name into a Spotlight search. Select it in the results (it should be at the top.)
    In the Finder, select Go ▹ Utilities from the menu bar, or press the key combination shift-command-U. The application is in the folder that opens.
    Open LaunchPad. Click Utilities, then Terminal in the icon grid.
    Click anywhere in the Terminal window and paste by pressing command-V. The text you pasted should vanish immediately. If it doesn't, press the return key.
    8. If you see an error message in the Terminal window such as "syntax error," enter
    exec bash
    and press return. Then paste the script again.
    9. If you're logged in as an administrator, you'll be prompted for your login password. Nothing will be displayed when you type it. You will not see the usual dots in place of typed characters. Make sure caps lock is off. Type carefully and then press return. You may get a one-time warning to be careful. If you make three failed attempts to enter the password, the test will run anyway, but it will produce less information. In most cases, the difference is not important. If you don't know the password, or if you prefer not to enter it, press the key combination control-C or just press return three times at the password prompt. Again, the script will still run.
    If you're not logged in as an administrator, you won't be prompted for a password. The test will still run. It just won't do anything that requires administrator privileges.
    10. The test may take a few minutes to run, depending on how many files you have and the speed of the computer. A computer that's abnormally slow may take longer to run the test. While it's running, there will be nothing in the Terminal window and no indication of progress. Wait for the line
    [Process completed]
    to appear. If you don't see it within half an hour or so, the test probably won't complete in a reasonable time. In that case, close the Terminal window and report the results. No harm will be done.
    11. When the test is complete, quit Terminal. The results will have been copied to the Clipboard automatically. They are not shown in the Terminal window. Please don't copy anything from there. All you have to do is start a reply to this comment and then paste by pressing command-V again.
    At the top of the results, there will be a line that begins with the words "Start Time." If you don't see that, but instead see a mass of gibberish, you didn't wait for the "Process completed" message to appear in the Terminal window. Please wait for it and try again.
    If any private information, such as your name or email address, appears in the results, anonymize it before posting. Usually that won't be necessary.
    12. When you post the results, you might see the message, "You have included content in your post that is not permitted." It means that the forum software has misidentified something in the post as a violation of the rules. If that happens, please post the test results on Pastebin, then post a link here to the page you created.
    Note: This is a public forum, and others may give you advice based on the results of the test. They speak only for themselves, and I don't necessarily agree with them.
    Copyright © 2014 by Linc Davis. As the sole author of this work, I reserve all rights to it except as provided in the Use Agreement for the Apple Support Communities website ("ASC"). Readers of ASC may copy it for their own personal use. Neither the whole nor any part may be redistributed.

  • How can we tell the printer to use a different paper cartridge

    Hello all,
    We are using t.code MN05 to assign a printer to each Purchase group. How can we tell the printer to use a different paper cartridge so that purchase orders ( output type ZNEU, ZEU, ZEN) can be printed on a paper with company logotype. Local team are removing most of the printers an we have only one multifunction printer availabel for a large number of employees.
    Thank you for your suggestions

    Hi,
    I can help you about how to use different Paper Tray's but different cartridge case I am not sure...

  • IPhone 5 is fried, how can I tell amount of GB?

    My phone is pretty much a brick, doesn't boot up past crazy screens of code or the plug/itunes screen.  How can I tell its storage capacity? Or what its storage capacity would be if it was functional?

    Actually, the logic board wasn't toast.  I brought my phone and the replacement a friend sent me to a local apple repair shop with the goal of swapping my pristine screen and decent battery into my friend's. I'd have a near perfect 16 GB phone to get me through until whenever and a backup (if less than optimal) screen and battery handy in case I did damage to the one I was using. 
    When I picked up the phones, I was surprised to find that for $50 total I had two perfectly functioning black and white Frankensteins.  Turns out my fried phone just needed the contacts cleaned with alcohol and a wipe. I'm very happy that I rejected the $249 replacement option at the apple store.
    And using the menus as Steve Jobs intended, I confirmed that my formerly fried phone is 64GB.

  • HT3939 how can i tell if i have a iphone 3 or 4

    how can i tell if i have a iphone3 or4

    http://support.apple.com/kb/HT3939?viewlocale=en_US&locale=en_US

  • How can I tell if I am being tracked through software installed on my iphone

    My ex is tracking me.......help...... it is getting really scary.
    How can I tell if I am being track using software installed on my iphone - installed without me knowing?

    If you are being tracked/harrassed by an ex and are feeling legitimately threatened I would reccomend contacting you local law enforcement.
    Change your iCloud/AppleID:  iCloud: Change your iCloud account password
    Contact your cellular carrier to change your number/blacklist his/her number.

  • My macbook pro no longer connects to my TV with the mini dvi to hdmi adapter. A while ago the computer fell down and hit the cable. How can I tell if the computer is working ok. Doesn't show mirroring any more.

    My macbook pro no longer connects to my TV with the mini dvi to hdmi adapter. A while ago the computer fell down and hit the cable. How can I tell if the computer is working ok. Doesn't show mirroring any more. Was working while watching a movie but when I pulled it out from the computer and put it back in the system would no longer mirrorr the screen on the TV.

    The best option is an appointment at an Apple store genius bar.  The evaluation will be for FREE!
    Ciao.

Maybe you are looking for