Mac for a public computer

Currently we have a public computer from our service provider for a public computer at our hotel. We have so many issues with the security on the Windows XP computer that it's just a pain to use. Just wondering, does Mac have a way if a guest logs into the "guest" account, that when they log out it will delete all browsing history/saved documents for security/privacy?

w0by,
by default the guest account has no "home" folder in which to store these files. They are stored temporarily until the guest logs out at which point the files are deleted. Check out http://docs.info.apple.com/article.html?path=Mac/10.5/en/15600.html as it explains the guest account more thoroughly.
Also, for added security, you could log into an administrator account after using the guest account and erase the free space from the hard drive. This would wipe out the guest's temporary home folder for good. Just make sure to use the secure zero out data option.

Similar Messages

  • My bank's system upgrade tells me that my Mac is a public computer.  I know it's not but how do I find out for sure?

    I purchased myMac for private, personal use.    However, my bank's system upgrade says my Mac is a public computer and as such will now allow me to access any of my account information.   The passcode that the bank gave to me will not work with a public computer.   How can I make sure that my computer is still a private computer and not a public one?   If it has become public, since the bank system upgrade, how dp I get it back to being a private computer for my use only?    HELP PLEASE!

    When most bank sites ask whether or not your computer is public or private, it is usually for you to understand that if you are on a public computer...like a library...to not have the computer remember your personal password and also to remind you to log out.  If you are the only one that uses this computer, it is private. 

  • I have a lot of HD video on my hard drive that I eventually want to edit in iMovie, but just don't have the time now.  It is clogging up the computer, though.  How do I take the Hd clips off Mac for later editing?

    I have a lot of HD video on my hard drive that I eventually want to edit in iMovie, but just don't have the time now.  It is clogging up the computer, though.  How do I take the Hd clips off Mac for later editing?

    See "Storage drive" here
    Most commonly used backup methods
    Th problem with HD video is it needs a fast external interface, so you should pick a external drive that uses the fastest interface your computer has to offer.
    Performance rank fastest to slowest is
    Thunderbolt, USB3, (newer Mac's)
    Firewire 800, USB 2, Firewire 400, USB 1 (older Mac's)
    Newer Windows PC's have USB3, older one's USB 2,1.
    You need to format the drive if it comes FAT which a lot do, as FAT has a 4GB file size limit, so this won't work with large HD video files.
    So if your  going to use the drive only with a Mac, then head to Utlities > Disk Utility and format it Options: GUID Format: OS X Extended Journaled. (select the drive makers name and click Partition tab)
    If your going to use the external drive with a PC, take it to the oldest PC you have and right click and format exFAT.
    If you have a Windows XP machine and there is no exFAT, it can be downloaded for free from Microsoft.
    Drives, partitions, formatting w/Mac's + PC's

  • I've just migrated my Logic Pro 9.1.8 to a new Mac because my old computer crashed. They are asking for a serial number, but I don't have the install disks anymore. Is there someplace in the software itself that I can find the serial number?

    I've just migrated my Logic Pro 9.1.8 to a new Mac because my old computer crashed. They are asking for a serial number, but I don't have the install disks anymore. Is there someplace in the software itself that I can find the serial number?

    Please stop making multiple posts on the same subject.. This is the third thread you have created in a short space of time asking the same question.
    Please read the answers given in this thread you posted...
    https://discussions.apple.com/thread/5311324?tstart=0

  • After joining computer to the windows doamin i cannot change password for Mac for the domain user

    After joining computer to the windows doamin i cannot change password for Mac for the domain user

    Hi,
    Did this problem occures after installed Windows 8.1 Update 1? Here is another thread that had similar problem. Also I don't think this problem relate with Domain. Please refer to the solution of the thread below for reference, If there is any
    progress, please let us know.
    http://social.technet.microsoft.com/Forums/en-US/08993680-b6f5-4e80-b031-d32fec97d682/not-able-to-right-click-on-tiles-after-81-update?forum=w8itproge
    Roger Lu
    TechNet Community Support

  • I have purchased Lightroom 5 for my window computer. I have just purchased an Apple Mac and want to install it there also but Adobe won't accept my existing Lightroom key

    I have purchased Lightroom 5 for my window computer. I have just purchased an Apple Mac and want to install it there also but Adobe won't accept my existing Lightroom key

    KRupani wrote:
    Hi bertalan,
    The Lightroom windows serial key will not work with the Mac as the these serial keys are platform specific.
    Thanks
    Kapil
    The Lightroom serial number is cross-platform. It works on both Windows and Mac.
    Something else is going on here.

  • How can I download Photoshop CS5 which I bought for a Windows PC onto my Mac as the second computer?

    How can I download Photoshop CS5 which I bought for a Windows PC onto my Mac as the second computer?

    It's not possible. Serial numbers are platform specific. Even if you install the CS5 trail version, it won't activate with your PC serial. Your only option is to upgrade to Creative Cloud.
    Mylenium

  • ICan't ReInstall my computer  please help. need to use Mac for school next week

    I use my Mac for School and stuff happened.
    Long story short.
    1) I tried to reset my Mac Book Pro  computer and I did.( by pressing option key and go to disk utility and erase tab and erase)
    2) then I know I was supposed to go to Reinstall OS X Lion and I did but I quit. (took 10 hrs and plus my internet is bad and couldn't DL the other stuff)
    3) I remembered that I had a recovery disk. so I inserted it and I went to the disk utility, dragged the Macintosh HD to the restore tab, destination, and it copied my recovery disk data? to my Machintosh HD and the name of it changed to Mac OS X Base System ( the name of my recovery disk)
    4) and I tried to restart, shut down my computer, it sends me to the same Mac OS Utilities. Again.
    5) so I went to Reinstall Mac OS Lion, agreed, and the download destination usually should be the Macintosh HD ( for me its Mac OS X Base System right now) but it said it is locked (because I'm dumb) and i can't install it now.
    6) i don't know what to do now because this is not my computer that I'm sending this support from. and I can't use my original Mac Book. what should I do?
    AND I NEED TO USE THE MAC NEXT WEEK FOR SCHOOL.
    more info: MacBook Pro 13 inch Late 2011 ( got it for christmas)
    OS 10.7.5 ( recovery disk is 10.7.2)
    had no problems for 2 years.
    Why is Internet bad? Japan. thats why.
    For those who wonder why I wanted to reset/restore my MacBook Pro or, want to hear the long story:
    I play League of Legends, Steam, Osu! on my Mac and it took alot of capacity (or space).
    And League of Legends has thisthing called "Item sets" that when you save it, it doesnt save it in the client (or app),  it saves the "item sets" data in your computer (took alot of capacity/space)
    Not just that, and I had iPhoto but when i downloaded iLife to my mac, and after that, it said my iPhoto is damaged and it can't open.
    And summer ended, my parents said If I fail my 11th grade, they are going to kick me out so I told them I'm going to reset my Mac to factory settings and get a fresh start, well this happened.

    hi there! I got it back to work by buying the USB version of Mac OS X Lion 10.7
    and since my internet connections are kinda bad, I'm not able to download and update it to 10.7.5.
    but anyways I got it back to work.
    All I can say is I suggest you to buy the USB version of Mac OS X Lion 10.7 from amazon or apple store.

  • What is the best program to use on Mac for editing, cropping photos from my computer. Looking for a free program that is good.

    What is the best program to use on Mac for editing, cropping photos from my computer. Looking for a free program that is good.

    If your needs are limited to those tasks then both Preview and iPhoto will fit the bill They are already on your Mac. There is a free download from Google called Picasa available here:
    http://picasa.google.com/
      It works much the in same manner as iPhoto. For some really heavy duty work there is GIMP available from SourceForge:
    http://www.gimp.org/macintosh/  Also a free download.
    Message was edited by: kennethfromtoronto

  • Help needed - automatic log in on public computer.   How to get rid of the account.

    Hi there
    Recently while on vacation, my son logged into a public computer on his ichat.  Unfortuantely, it was clicked as automatic log in.
    Now we are back home and have realized that someone has been accessing his account.
    We have tried deleting the account from our home computer, however, it does not delete it from the public computer.
    What will happen if we  change the password on our home computer?  Will the public computer be prompted to re-login with the new password, and therefore won't be able to?
    Help please

    hI,
    Yes change the Password and they will not be able to login.
    That is change the Password at the server you are using.
    Either AIM itself for AIM name or iForgot for @MAC.com or MobilMe names
    Login to your Google account and change the password there in your Account Settings
    With any other Jabber Account you will have to use the third Party app you used to get the accounst Name set up.
    Then Change it in iChat.
    10:25 PM      Sunday; June 26, 2011
    Please, if posting Logs, do not post any Log info after the line "Binary Images for iChat"
     G4/1GhzDual MDD (Leopard 10.5.8)
     MacBookPro 2Gb( 10.6.7)
     Mac OS X (10.6.7),
    "Limit the Logs to the Bits above Binary Images."  No, Seriously
    Message was edited by: Ralph Johns (UK)

  • Unable to calculate correct C-MAC for doing EXTERNAL AUTHENTICATE

    I’m facing a problem successfully executing the EXTERNAL_AUTHENTICATE command for establishing a secure session. I get a 69 82 response meaning “Security status not satisfied”. I have concluded that the C-MAC I’m computing must somehow be wrong, because when I walked through the a tutorial file given to us, I’m not able to arrive at the same C-MAC value illustrated in the document .
    Command : 84 82 01 00 10
    Input Data : F6 17 A4 CB 36 80 F3 37 (Host cryptogram)
    For the above data the C-MAC computed is shown as “3F 67 D7 B5 0C 0D 9C 60” using the S-MAC key AD79403568BE1B46250E389475D2BD7E but I’m arriving at a S-MAC key value of “98 18 0c 25 38 ad 54 8c” using the same key and a padding of 8000000000000000000000
    I’m pasting below a sample program that shows how I’m arriving at this value. Can you please help me understand what they are doing differently to arrive at the values that only work with the card?
    Thanks
    Kannan
    import java.security.InvalidAlgorithmParameterException;
    import java.security.InvalidKeyException;
    import java.security.NoSuchAlgorithmException;
    import javax.crypto.BadPaddingException;
    import javax.crypto.Cipher;
    import javax.crypto.IllegalBlockSizeException;
    import javax.crypto.NoSuchPaddingException;
    import javax.crypto.spec.IvParameterSpec;
    import javax.crypto.spec.SecretKeySpec;
    public class Cryptogram
    public static byte[] hexToBuffer(String hexString) throws NumberFormatException
              int length = hexString.length();
              byte[] buffer = new byte[(length+1)/2];
              boolean evenByte = true;
              byte nextByte = 0;
              int bufferOffset = 0;
              if ((length%2)==1)
                   evenByte = false;
              for (int i=0; i<length; i++) {
                   char c = hexString.charAt(i);
                   int nibble;
                   if ((c>='0')&&(c<='9'))
                        nibble = c - '0';
                   else if ((c>='A')&&(c<='F'))
                        nibble = c - 'A' + 0x0A;
                   else if ((c>='a')&&(c<='f'))
                        nibble = c - 'a' + 0x0A;
                   else throw new NumberFormatException("Invalid hex digit '"+c+"'.");
                   if (evenByte) {
                        nextByte = (byte)(nibble<<4);
                   } else {
                        nextByte += (byte)nibble;
                        buffer[bufferOffset++] = nextByte;
                   evenByte = !evenByte;
              return buffer;
    private static SecretKeySpec getKeySpec(byte[] key) {
    if (key.length == 16) {
    byte[] key24 = new byte[24];
    System.arraycopy(key,0,key24,0,16);
    System.arraycopy(key,0,key24,16,8);
    return new SecretKeySpec(key24,"DESede");
    } else {
    return new SecretKeySpec(key,"DESede");
    public static byte[] cbcMac(byte[] data,byte[] sessKey) throws NoSuchAlgorithmException, NoSuchPaddingException, InvalidKeyException, InvalidAlgorithmParameterException, IllegalBlockSizeException, BadPaddingException {
    byte[] temp;
    Cipher cbcDES = Cipher.getInstance("DESede/CBC/NoPadding");
    byte[] DEFAULT_ICV = new byte[8];
    IvParameterSpec params = new IvParameterSpec(DEFAULT_ICV);                         
    cbcDES.init(Cipher.ENCRYPT_MODE, getKeySpec(sessKey), params);
    temp = cbcDES.doFinal(data);
    byte[] signature = new byte[8];
    System.arraycopy(temp, temp.length - 8, signature, 0, signature.length);
    return signature;
    public static void main(String args[]) throws Exception
    byte[] toSign = HexString.hexToBuffer("8482010010f617a4cb3680f3378000000000000000000000");
              byte[] sessKey = HexString.hexToBuffer("AD79403568BE1B46250E389475D2BD7E");
              byte[] cryptogram = cbcMac(toSign,sessKey);
              System.out.println("Cryptogram=" + HexString.bufferToHex(cryptogram));
    }

    user4928701 wrote:
    I don't know the format you are mentioning, I'm using oberthur v7 card.
    I realized that the mistake was in the padding of "8482010010f617a4cb3680f3378000000000000000000000";
    I'm supposed to pad only with 800000 as that gives a number of bytes in multiple of 8, but I had added yet another 0 sequence of 8 bytes.
    The format for external authenticate is 5 byte command + host cryptogram + C-MAC value for the padded sequence computed using S-MAC key.Then you are using the wrong code. The code you posted is for generating the host cryptogram. The code for the MAC for each command (including EXT AUTH) is different.
    Cheers,
    Shane

  • How to get Mac Address of Remote Computer

    Hi All,
    I tried to find out a solution for finding Mac Address of a remote system, then first i tried with finding it with local address using the following code it works fine for me.
    public class MacAddressFinder {
         public static void main(String[] args) {
              try
                   InetAddress ipAddr = InetAddress.getLocalHost();
                   System.out.println("Current IP address : " + ipAddr.getHostAddress());
                   NetworkInterface nwIntf;
                   try
                        nwIntf = NetworkInterface.getByInetAddress(ipAddr);
                        byte[] hwAddr = nwIntf.getHardwareAddress();
                        System.out.print("Current MAC address : ");
                        StringBuilder sb = new StringBuilder();
                        for (int i = 0; i < hwAddr.length; i++)
                             sb.append(String.format("%02X%s", hwAddr, (i < hwAddr.length - 1) ? "-" : ""));          
                        System.out.println(sb);
                   } catch (SocketException e) {
                        e.printStackTrace();
              catch (UnknownHostException e) {
                   e.printStackTrace();
    But when i tried this piece of code in jsp with the following code i am getting NeworkInterface object value as null and there by i am unable to get the Mac Address of a remote computer.
    InetAddress ipAddr = InetAddress.getByName(request.getRemoteAddr());
    NetworkInterface nwIntf = NetworkInterface.getByInetAddress(ipAddr);Can you please suggest me how to find out the Mac address of remote system?
    Thanks,
    Uday

    first of all, NetworkInterface only exposes the NetworkInterfaces of the local computer. secondly, you cannot find the mac address of an arbitrary remote computer. that information is not available outside of the local subnet. and java doesn't expose a way to discover it even for computers on the local subnet.

  • How can i scan my mac for virus's

    I download alot of music (not from stupid or untrusted sites) and torrents (mostly movies and music and software) but nothing stupid that i know for sure will infect my Macbook Air............but just to be on the safe side i want to know if their is a safe way i can scan my mac for a virus? from my personal experience anti virus's do more harm than good  Suggestion? SOLUTIONS?

    1. This procedure is a diagnostic test. It changes nothing, for better or worse, and therefore will not, in itself, solve the problem. But with the aid of the test results, the solution may take a few minutes, instead of hours or days.
    Don't be put off by the complexity of these instructions. The process is much less complicated than the description. You do harder tasks with the computer all the time.
    2. If you don't already have a current backup, back up all data before doing anything else. The backup is necessary on general principle, not because of anything in the test procedure. Backup is always a must, and when you're having any kind of trouble with the computer, you may be at higher than usual risk of losing data, whether you follow these instructions or not.
    There are ways to back up a computer that isn't fully functional. Ask if you need guidance.
    3. Below are instructions to run a UNIX shell script, a type of program. As I wrote above, it changes nothing. It doesn't send or receive any data on the network. All it does is to generate a human-readable report on the state of the computer. That report goes nowhere unless you choose to share it. If you prefer, you can read it yourself without disclosing the contents to me or anyone else.
    You should be wondering whether you can believe me, and whether it's safe to run a program at the behest of a stranger. In general, no, it's not safe and I don't encourage it.
    In this case, however, there are a couple of ways for you to decide whether the program is safe without having to trust me. First, you can read it. Unlike an application that you download and click to run, it's transparent, so anyone with the necessary skill can verify what it does.
    You may not be able to understand the script yourself. But variations of the script have been posted on this website thousands of times over a period of years. The site is hosted by Apple, which does not allow it to be used to distribute harmful software. Any one of the millions of registered users could have read the script and raised the alarm if it was harmful. Then I would not be here now and you would not be reading this message.
    Nevertheless, if you can't satisfy yourself that these instructions are safe, don't follow them. Ask for other options.
    4. Here's a summary of what you need to do, if you choose to proceed:
    ☞ Copy a line of text in this window to the Clipboard.
    ☞ Paste into the window of another application.
    ☞ Wait for the test to run. It usually takes a few minutes.
    ☞ Paste the results, which will have been copied automatically, back into a reply on this page.
    The sequence is: copy, paste, wait, paste again. You don't need to copy a second time. Details follow.
    5. You may have started the computer in "safe" mode. Preferably, these steps should be taken in “normal” mode, under the conditions in which the problem is reproduced. If the system is now in safe mode and works well enough in normal mode to run the test, restart as usual. If you can only test in safe mode, do that.
    6. If you have more than one user, and the one affected by the problem is not an administrator, then please run the test twice: once while logged in as the affected user, and once as an administrator. The results may be different. The user that is created automatically on a new computer when you start it for the first time is an administrator. If you can't log in as an administrator, test as the affected user. Most personal Macs have only one user, and in that case this section doesn’t apply. Don't log in as root.
    7. The script is a single long line, all of which must be selected. You can accomplish this easily by triple-clicking anywhere in the line. The whole line will highlight, though you may not see all of it in the browser window, and you can then copy it. If you try to select the line by dragging across the part you can see, you won't get all of it.
    Triple-click anywhere in the line of text below on this page to select it:
    PATH=/usr/bin:/bin:/usr/sbin:/sbin:/usr/libexec;clear;cd;p=(Software Hardware Memory Diagnostics Power FireWire Thunderbolt USB Fonts SerialATA 4 1000 25 5120 KiB/s 1024 85 \\b%% 20480 1 MB/s 25000 ports ' com.clark.\* \*dropbox \*GoogleDr\* \*k.AutoCAD\* \*k.Maya\* vidinst\* ' DYLD_INSERT_LIBRARIES\ DYLD_LIBRARY_PATH -86 "` route -n get default|awk '/e:/{print $2}' `" 25 N\\/A down up 102400 25600 recvfrom sendto CFBundleIdentifier 25 25 25 1000 MB com.apple.AirPortBaseStationAgent 464843899 51 5120 files );N5=${#p[@]};p[N5]=` networksetup -listnetworkserviceorder|awk ' NR>1 { sub(/^\([0-9]+\) /,"");n=$0;getline;} $NF=="'${p[26]}')" { sub(/.$/,"",$NF);print n;exit;} ' `;f=('\n%s: %s\n' '\n%s\n\n%s\n' '\nRAM details\n%s\n' %s\ %s '%s\n-\t%s\n' );S0() { echo ' { q=$NF+0;$NF="";u=$(NF-1);$(NF-1)="";gsub(/^ +| +$/,"");if(q>='${p[$1]}') printf("%s (UID %s) is using %s '${p[$2]}'",$0,u,q);} ';};s=(' /^ *$|CSConfigDot/d;s/^ */   /;s/[-0-9A-Fa-f]{22,}/UUID/g;s/(ochat)\.[^.]+(\..+)/\1\2/;/Shared/!s/\/Users\/[^/]+/~/g ' ' s/^ +//;/de: S|[nst]:/p;' ' {sub(/^ +/,"")};/er:/;/y:/&&$2<'${p[10]} ' 1s/://;3,6d;/[my].+:/d;s/^ {4}//;H;${ g;s/\n$//;/s: [^EO]|x([^08]|02[^F]|8[^0])/p;} ' ' 5h;6{ H;g;/P/!p;} ' ' ($1~/^Cy/&&$3>'${p[11]}')||($1~/^Cond/&&$2!~/^N/) ' ' /:$/{ N;/:.+:/d;s/ *://;b0'$'\n'' };/^ *(V.+ [0N]|Man).+ /{ s/ 0x.... //;s/[()]//g;s/(.+: )(.+)/ (\2)/;H;};$b0'$'\n'' d;:0'$'\n'' x;s/\n\n//;/Apple[ ,]|Genesy|Intel|SMSC/d;s/\n.*//;/\)$/p;' ' s/^.*C/C/;H;${ g;/No th|pms/!p;} ' '/= [^GO]/p' '{$1=""};1' ' /Of/!{ s/^.+is |\.//g;p;} ' ' $0&&!/ / { n++;print;} END { if(n<200) print "com.apple.";} ' ' $3~/[0-9]:[0-9]{2}$/ { gsub(/:[0-9:a-f]{14}/,"");} { print|"tail -n'${p[12]}'";} ' ' NR==2&&$4<='${p[13]}' { print $4;} ' ' END { $2/=256;if($2>='${p[15]}') print int($2) } ' ' NR!=13{next};{sub(/[+-]$/,"",$NF)};'"`S0 21 22`" 'NR!=2{next}'"`S0 37 17`" ' NR!=5||$8!~/[RW]/{next};{ $(NF-1)=$1;$NF=int($NF/10000000);for(i=1;i<=3;i++){$i="";$(NF-1-i)="";};};'"`S0 19 20`" 's:^:/:p' '/\.kext\/(Contents\/)?Info\.plist$/p' 's/^.{52}(.+) <.+/\1/p' ' /Launch[AD].+\.plist$/ { n++;print;} END { print "'${p[41]}'";if(n<200) print "/System/";} ' '/\.xpc\/(Contents\/)?Info\.plist$/p' ' NR>1&&!/0x|\.[0-9]+$|com\.apple\.launchctl\.(Aqua|Background|System)$|'${p[41]}'/ { print $3;} ' ' /\.(framew|lproj)|\):/d;/plist:|:.+(Mach|scrip)/s/:[^:]+//p ' '/^root$/p' ' !/\/Contents\/.+\/Contents|Applic|Autom|Frameworks/&&/Lib.+\/Info.plist$/ { n++;print;} END { if(n<1100) print "/System/";} ' '/^\/usr\/lib\/.+dylib$/p' ' /Temp|emac/{next};/(etc|Preferences|Launch[AD].+)\// { sub(".(/private)?","");n++;print;} END { print "'${p[41]}'.plist\t'${p[42]}'";if(n<500) print "Launch";} ' ' /\/(Contents\/.+\/Contents|Frameworks)\/|\.wdgt\/.+\.([bw]|plu)/d;p;' 's/\/(Contents\/)?Info.plist$//;p' ' { gsub("^| |\n","\\|\\|kMDItem'${p[35]}'=");sub("^...."," ") };1 ' p '{print $3"\t"$1}' 's/\'$'\t''.+//p' 's/1/On/p' '/Prox.+: [^0]/p' '$2>'${p[43]}'{$2=$2-1;print}' ' BEGIN { i="'${p[26]}'";M1='${p[16]}';M2='${p[18]}';M3='${p[31]}';M4='${p[32]}';} !/^A/{next};/%/ { getline;if($5<M1) a="user "$2"%, system "$4"%";} /disk0/&&$4>M2 { b=$3" ops/s, "$4" blocks/s";} $2==i { if(c) { d=$3+$4+$5+$6;next;};if($4>M3||$6>M4) c=int($4/1024)" in, "int($6/1024)" out";} END { if(a) print "CPU: "a;if(b) print "I/O: "b;if(c) print "Net: "c" (KiB/s)";if(d) print "Net errors: "d" packets/s";} ' ' /r\[0\] /&&$NF!~/^1(0|72\.(1[6-9]|2[0-9]|3[0-1])|92\.168)\./ { print $NF;exit;} ' ' !/^T/ { printf "(static)";exit;} ' '/apsd|BKAg|OpenD/!s/:.+//p' ' (/k:/&&$3!~/(255\.){3}0/ )||(/v6:/&&$2!~/A/ ) ' ' $1~"lR"&&$2<='${p[25]}';$1~"li"&&$3!~"wpa2";' ' BEGIN { FS=":";p="uniq -c|sed -E '"'s/ +\\([0-9]+\\)\\(.+\\)/\\\2 x\\\1/;s/x1$//'"'";} { n=split($3,a,".");sub(/_2[01].+/,"",$3);print $2" "$3" "a[n]$1|p;b=b$1;} END { close(p);if(b) print("\n\t* Code injection");} ' ' NR!=4{next} {$NF/=10240} '"`S0 27 14`" ' END { if($3~/[0-9]/)print$3;} ' ' BEGIN { L='${p[36]}';} !/^[[:space:]]*(#.*)?$/ { l++;if(l<=L) f=f"\n   "$0;} END { F=FILENAME;if(!F) exit;if(!f) f="\n   [N/A]";"file -b "F|getline T;if(T!~/^(AS.+ (En.+ )?text$|(Bo|PO).+ sh.+ text ex)/) F=F" ("T")";printf("\nContents of %s\n%s\n",F,f);if(l>L) printf("\n   ...and %s more line(s)\n",l-L);} ' ' BEGIN{FS="= "} /Name/{print $2} ' 's/0/Off/p' ' END{print NR} ' ' /id: N|te: Y/{i++} END{print i} ' ' / / { print "'"${p[28]}"'";exit;};1;' '/ en/!s/\.//p' ' NR!=13{next};{sub(/[+-M]$/,"",$NF)};'"`S0 39 40`" ' $10~/\(L/&&$9!~"localhost" { sub(/.+:/,"",$9);print $1": "$9;} ' '/^ +r/s/.+"(.+)".+/\1/p' 's/(.+\.wdgt)\/(Contents\/)?Info\.plist$/\1/p' 's/^.+\/(.+)\.wdgt$/\1/p' ' /l: /{ /DVD/d;s/.+: //;b0'$'\n'' };/s: /{ /V/d;s/^ */- /;H;};$b0'$'\n'' d;:0'$'\n'' x;/APPLE [^:]+$/d;p;' ' /^find: /d;p;' "`S0 44 45`" );c1=(system_profiler pmset\ -g nvram fdesetup find syslog df vm_stat sar ps sudo\ crontab sudo\ iotop top pkgutil 'PlistBuddy 2>&1 -c "Print' whoami cksum kextstat launchctl sudo\ launchctl crontab 'sudo defaults read' stat lsbom mdfind ' for i in ${p[24]};do ${c1[18]} ${c2[27]} $i;done;' defaults\ read scutil sudo\ dtrace sudo\ profiles sed\ -En awk /S*/*/P*/*/*/C*/*/airport networksetup mdutil sudo\ lsof test );c2=(com.apple.loginwindow\ LoginHook '" /L*/P*/loginw*' '" L*/P*/*loginit*' 'L*/Ca*/com.ap*.Saf*/E*/* -d 1 -name In*t -exec '"${c1[14]}"' :CFBundleDisplayName" {} \;|sort|uniq' '~ $TMPDIR.. \( -flags +sappnd,schg,uappnd,uchg -o ! -user $UID -o ! -perm -600 \)' '.??* -path .Trash -prune -o -type d -name *.app -print -prune' :${p[35]}\" :Label\" '{/,}L*/{Con,Pref}* -type f ! -size 0 -name *.plist -exec plutil -s {} \;' "-f'%N: %l' Desktop L*/Keyc*" therm sysload boot-args status " -F '\$Time \$Message' -k Sender kernel -k Message Req 'bad |Beac|caug|dead[^bl]|FAIL|fail|GPU |hfs: Ru|inval|jnl:|last value [1-9]|n Cause: -|NVDA\(|pagin|proc: t|Roamed|rror|ssert|Thrott|tim(ed? ?|ing )o|WARN' -k Message Rne 'Goog|ksadm|SMC:| VALI|xpma' -o -k Sender fseventsd -k Message Req 'SL' " '-du -n DEV -n EDEV 1 10' 'acrx -o comm,ruid,%cpu' '-t1 10 1' '-f -pfc /var/db/r*/com.apple.*.{BS,Bas,Es,J,OSXU,Rem,up}*.bom' '{/,}L*/Lo*/Diag* -type f -regex .\*[cgh] ! -name *ag \( -exec grep -lq "^Thread c" {} \; -exec printf \* \; -o -true \) -execdir stat -f:%Sc:%N -t%F {} \;|sort -t: -k2 |tail -n'${p[38]} '-L {/{S*/,},}L*/Lau* -type f' '-L /{S*/,}L*/StartupItems -type f -exec file {} +' '-L /S*/L*/{C*/Sec*A,E}* {/,}L*/{A*d,Ca*/*/Ex,Co{mpon,reM},Ex,Inter,iTu*/*P,Keyb,Mail/B,Pr*P,Qu*T,Scripti,Sec,Servi,Spo,Widg}* -path \\*s/Resources -prune -o -type f -name Info.plist' '/usr/lib -type f -name *.dylib' `awk "${s[31]}"<<<${p[23]}` "/e*/{auto,{cron,fs}tab,hosts,{[lp],sy}*.conf,pam.d/*,ssh{,d}_config,*.local} {,/usr/local}/etc/periodic/*/* /L*/P*{,/*}/com.a*.{Bo,sec*.ap}*t /S*/L*/Lau*/*t .launchd.conf" list getenv /Library/Preferences/com.apple.alf\ globalstate --proxy '-n get default' -I --dns -getdnsservers\ "${p[N5]}" -getinfo\ "${p[N5]}" -P -m\ / '' -n1 '-R -l1 -n1 -o prt -stats command,uid,prt' '--regexp --only-files --files com.apple.pkg.*|sort|uniq' -kl -l -s\ / '-R -l1 -n1 -o mem -stats command,uid,mem' '+c0 -i4TCP:0-1023' com.apple.dashboard\ layer-gadgets '-d /L*/Mana*/$USER&&echo On' '-app Safari WebKitDNSPrefetchingEnabled' "+c0 -l|awk '{print(\$1,\$3)}'|sort|uniq -c|sort -n|tail -1|awk '{print(\$2,\$3,\$1)}'" );N1=${#c2[@]};for j in {0..9};do c2[N1+j]=SP${p[j]}DataType;done;N2=${#c2[@]};for j in 0 1;do c2[N2+j]="-n ' syscall::'${p[33+j]}':return { @out[execname,uid]=sum(arg0) } tick-10sec { trunc(@out,1);exit(0);} '";done;l=(Restricted\ files Hidden\ apps 'Elapsed time (s)' POST Battery Safari\ extensions Bad\ plists 'High file counts' User Heat System\ load boot\ args FileVault Diagnostic\ reports Log 'Free space (MiB)' 'Swap (MiB)' Activity 'CPU per process' Login\ hook 'I/O per process' Mach\ ports kexts Daemons Agents launchd Startup\ items Admin\ access Root\ access Bundles dylibs Apps Font\ issues Inserted\ dylibs Firewall Proxies DNS TCP/IP Wi-Fi Profiles Root\ crontab User\ crontab 'Global login items' 'User login items' Spotlight Memory Listeners Widgets Parental\ Controls Prefetching SATA Descriptors );N3=${#l[@]};for i in 0 1 2;do l[N3+i]=${p[5+i]};done;N4=${#l[@]};for j in 0 1;do l[N4+j]="Current ${p[29+j]}stream data";done;A0() { id -G|grep -qw 80;v[1]=$?;((v[1]==0))&&sudo true;v[2]=$?;v[3]=`date +%s`;clear >&-;date '+Start time: %T %D%n';};for i in 0 1;do eval ' A'$((1+i))'() { v=` eval "${c1[$1]} ${c2[$2]}"|'${c1[30+i]}' "${s[$3]}" `;[[ "$v" ]];};A'$((3+i))'() { v=` while read i;do [[ "$i" ]]&&eval "${c1[$1]} ${c2[$2]}" \"$i\"|'${c1[30+i]}' "${s[$3]}";done<<<"${v[$4]}" `;[[ "$v" ]];};A'$((5+i))'() { v=` while read i;do '${c1[30+i]}' "${s[$1]}" "$i";done<<<"${v[$2]}" `;[[ "$v" ]];};';done;A7(){ v=$((`date +%s`-v[3]));};B2(){ v[$1]="$v";};for i in 0 1;do eval ' B'$i'() { v=;((v['$((i+1))']==0))||{ v=No;false;};};B'$((3+i))'() { v[$2]=`'${c1[30+i]}' "${s[$3]}"<<<"${v[$1]}"`;} ';done;B5(){ v[$1]="${v[$1]}"$'\n'"${v[$2]}";};B6() { v=` paste -d: <(printf "${v[$1]}") <(printf "${v[$2]}")|awk -F: ' {printf("'"${f[$3]}"'",$1,$2)} ' `;};B7(){ v=`grep -Fv "${v[$1]}"<<<"$v"`;};C0(){ [[ "$v" ]]&&echo "$v";};C1() { [[ "$v" ]]&&printf "${f[$1]}" "${l[$2]}" "$v";};C2() { v=`echo $v`;[[ "$v" != 0 ]]&&C1 0 $1;};C3() { v=`sed -E "$s"<<<"$v"`&&C1 1 $1;};for i in 1 2;do for j in 0 2 3;do eval D$i$j'(){ A'$i' $1 $2 $3; C'$j' $4;};';done;done;{ A0;D20 0 $((N1+1)) 2;D10 0 $N1 1;B0;C2 27;B0&&! B1&&C2 28;D12 15 37 25 8;A1 0 $((N1+2)) 3;C0;D13 0 $((N1+3)) 4 3;D23 0 $((N1+4)) 5 4;D13 0 $((N1+9)) 59 50;for i in 0 1 2;do D13 0 $((N1+5+i)) 6 $((N3+i));done;D13 1 10 7 9;D13 1 11 8 10;D22 2 12 9 11;D12 3 13 10 12;D23 4 19 44 13;D23 5 14 12 14;D22 6 36 13 15;D22 7 37 14 16;D23 8 15 38 17;D22 9 16 16 18;B1&&{ D22 35 49 61 51;D22 11 17 17 20;for i in 0 1;do D22 28 $((N2+i)) 45 $((N4+i));done;};D22 12 44 54 45;D22 12 39 15 21;A1 13 40 18;B2 4;B3 4 0 19;A3 14 6 32 0;B4 0 5 11;A1 17 41 20;B7 5;C3 22;B4 4 6 21;A3 14 7 32 6;B4 0 7 11;B3 4 0 22;A3 14 6 32 0;B4 0 8 11;B5 7 8;B1&&{ A2 19 26 23;B7 7;C3 23;};A2 18 26 23;B7 7;C3 24;A2 4 20 21;B7 6;B2 9;A4 14 7 52 9;B2 10;B6 9 10 4;C3 25;D13 4 21 24 26;B4 4 12 26;B3 4 13 27;A1 4 22 29;B7 12;B2 14;A4 14 6 52 14;B2 15;B6 14 15 4;B3 0 0 30;C3 29;A1 4 23 27;B7 13;C3 30;D13 24 24 32 31;D13 25 37 32 33;A2 23 18 28;B2 16;A2 16 25 33;B7 16;B3 0 0 34;B2 21;A6 47 21&&C0;B1&&{ D13 21 0 32 19;D13 10 42 32 40;D22 29 35 46 39;};D13 14 1 48 42;D12 34 43 53 44;D22 0 $((N1+8)) 51 32;D13 4 8 41 6;D12 26 28 35 34;D13 27 29 36 35;A2 27 32 39&&{ B2 19;A2 33 33 40;B2 20;B6 19 20 3;};C2 36;D23 33 34 42 37;B1&&D23 35 45 55 46;D23 32 31 43 38;D12 36 47 32 48;D13 20 42 32 41;D23 14 2 48 43;D13 4 5 32 1;D13 4 3 60 5;D12 26 48 49 49;B3 4 22 57;A1 26 46 56;B7 22;B3 0 0 58;C3 47;D22 4 4 50 0;D23 22 9 37 7;A7;C2 2;} 2>/dev/null|pbcopy;exit 2>&-
    Copy the selected text to the Clipboard by pressing the key combination command-C.
    8. Launch the built-in Terminal application in any of the following ways:
    ☞ Enter the first few letters of its name into a Spotlight search. Select it in the results (it should be at the top.)
    ☞ In the Finder, select Go ▹ Utilities from the menu bar, or press the key combination shift-command-U. The application is in the folder that opens.
    ☞ Open LaunchPad. Click Utilities, then Terminal in the icon grid.
    Click anywhere in the Terminal window and paste by pressing command-V. The text you pasted should vanish immediately. If it doesn't, press the return key.
    9. If you see an error message in the Terminal window such as "Syntax error" or "Event not found," enter
    exec bash
    and press return. Then paste the script again.
    10. If you're logged in as an administrator, you'll be prompted for your login password. Nothing will be displayed when you type it. You will not see the usual dots in place of typed characters. Make sure caps lock is off. Type carefully and then press return. You may get a one-time warning to be careful. If you make three failed attempts to enter the password, the test will run anyway, but it will produce less information. In most cases, the difference is not important. If you don't know the password, or if you prefer not to enter it, press the key combination control-C or just press return  three times at the password prompt. Again, the script will still run.
    If you're not logged in as an administrator, you won't be prompted for a password. The test will still run. It just won't do anything that requires administrator privileges.
    11. The test may take a few minutes to run, depending on how many files you have and the speed of the computer. A computer that's abnormally slow may take longer to run the test. While it's running, there will be nothing in the Terminal window and no indication of progress. Wait for the line
    [Process completed]
    to appear. If you don't see it within half an hour or so, the test probably won't complete in a reasonable time. In that case, close the Terminal window and report what happened. No harm will be done.
    12. When the test is complete, quit Terminal. The results will have been copied to the Clipboard automatically. They are not shown in the Terminal window. Please don't copy anything from there. All you have to do is start a reply to this comment and then paste by pressing command-V again.
    At the top of the results, there will be a line that begins with the words "Start time." If you don't see that, but instead see a mass of gibberish, you didn't wait for the "Process completed" message to appear in the Terminal window. Please wait for it and try again.
    If any private information, such as your name or email address, appears in the results, anonymize it before posting. Usually that won't be necessary.
    13. When you post the results, you might see an error message on the web page: "You have included content in your post that is not permitted," or "You are not authorized to post." That's a bug in the forum software. Please post the test results on Pastebin, then post a link here to the page you created.
    14. This is a public forum, and others may give you advice based on the results of the test. They speak only for themselves, and I don't necessarily agree with them.
    Copyright © 2014 by Linc Davis. As the sole author of this work, I reserve all rights to it except as provided in the Use Agreement for the Apple Support Communities website ("ASC"). Readers of ASC may copy it for their own personal use. Neither the whole nor any part may be redistributed.

  • Building a mac for editing?

    It is time for me to get a new computer for video editing and from what I hear it is much cheaper to buy the parts and build a computer that will end up being faster and better for video editing. At my last internship the owners built their macs for $800-$900 and they could edit any HD footage using FCP/After Effects and Maya flawlessly. When I try to search this all I see is "hackintosh" and PC's with mac operating systems. Is there a way to build a mac? anyone have a good tutorial or parts list? Is it a good idea to use PC pieces? Would I be better off just buying the 1200$ iMac from best buy? i currently own the older version of this iMac and it cant even watch HD footage in FCP.

    Being that this is Apple's discussion boards, it's probably inappropriate to get into a discussion about unauthorized 'hackintosh' solutions. But if you're serious about video production, and need something that you can depend on, then you definitely want to stick with an actual Mac. While some of the hackintosh users have had great experiences building their own boxes, they have universally all had to do a lot of additional tinkering, and had problems with compatibility and updates over the life of their machine. That may not be so bad if you're just goofing around and don't depend on the machine for anything, but it's an absolute dealbreaker if you use the machine professionally.
    The good news is that unless you're doing some seriously advanced stuff, you can do a lot on a fairly modest Mac these days. 15 or 17 inch MacBook Pro's (paired with an external drive), and an iMac (ideally also paired with an external drive) are solid solutions even when editing HD video (assuming you're not doing anything too effects-heavy), and a Mac Pro (which can easily accommmodate several internal drives) can handle just about anything you can throw at it. While Mac Pro's are expensive to start and just skyrocket upwards, they're extremely powerful and reliable (designed from the ground up to be 'always-on') and even the base model is pretty capable for video production.
    Whichever route you go, opt for upgraded graphics/GPU (if it's available), and you'll want to aim for 8GB RAM (on iMac and Mac Pro, you have the option of 16GB or more). A second hard drive is also highly recommended (for your cache and data files).
    Good luck!

  • How do I clear my bookmarks from the Firefox browser on a public computer, having synced my account to see them during a browsing session?

    Here's what I'm trying to achieve:
    1. I use Firefox on someone else's computer and sync my account to retrieve my bookmarks. (This works.)
    2. After finishing my browsing session, I sign out of my Firefox account, and my bookmarks are cleared from the Firefox browser. (This doesn't work.)
    I have tried the following options:
    a) Open menu > Options > Sync > untick 'Bookmarks' > OK. This doesn't clear my bookmarks from the browser, not even if I close and open it again. They all show up.
    b) Open menu > Options > Sync > under Firefox Account click 'Disconnect' > OK. This doesn't clear my bookmarks either, only necessecitates me signing in to sync again.
    I understand there used to be an option to 'unlink this device', which may clear all data including bookmarks, but I can't find it anywhere. I've also read an article suggesting clearing bookmarks etc can be achieved by deleting your Firefox profile from a device, but I fear this will delete global options such that I won't be able to access them on my home computer.
    Surely there must be a way of siging in then out of the Firefox account on different computers, like you can with e-mail, without leaving all your bookmarks etc open for every other user to see afterwards? I'm transfering to Firefox from Chrome precisely because it doesn't have the capacity to do this (scarily), and to clear my bookmarks from a friends' browser, I had to uninstall Chrome on her computer!
    Any help would be greatly appreciated.

    1. Sync wasn't intended to be used in that manner. You would be better off carrying around a USB Flash Stick with Portable Firefox for use on "strange" PC's.
    2. You could open the "Library" {Ctrl + Shift + B} and highlight all those bookmarks and then delete them all at once. But that would also delete all the other bookmarks, and it isn't foolproof. All another person would need to do it to '''''restore''''' a bookmark backup file that has your bookmarks. Beyond that, a new Profile could be created and then the current Profile deleted; but that's "messing with" someone else's computer - an action that is worthy of terminating a friendship over, IMO.
    And if that "public" computer was set up properly, Sync should have been disabled.

Maybe you are looking for

  • About ABAP Technical Systems and Business Systems

    Hi experts, I have an Integration scenary with XI and an R3 vía RFC. I've already created it in the development environment and when I'm going to transport to Consolidation and Production I find that the ABAP Business System related to the ABAP Techn

  • How do I download a CD from my computer to my iPod touch using iTunes?

    Hi! I just got a new iPod Touch today, it was my first one, and it's 16GB if you need to know that haha. Well, I have a CD that I really really like, (Justin Bieber Believe) and I want to download the songs from the cd onto my iPod using iTunes. Well

  • Do I need to export photos from Lightroom 4 before placing in InDesign CS6?

    I'm doing a print photo book layout in InDesign using photos that I am processing in Lightroom 4 & Photoshop CS6. My question is, do I need to "File > Export" the files from Lightroom before placing them into InDesign? Or are the Lightroom final chan

  • Question re master socket vs secondary and install...

    I'm seriously considering switching to Infinity but have a question re sockets. My current modem and network gigabit switching are all upstairs, coming from a secondary socket running outside the house from the master socket on the ground floor. I wa

  • Bridge cc 2014 problem

    I have ps6 and loaded trial cc2014.  When I load a pic into bridge and then open it into ps it goes to ps6, not cc 2014. How do i get bridge to open pic in cc 2014?