To Java Devs on Mac: is it wise to migrate to Mac for a Java/J2EE dev?

Cheers to all java devs on Mac,
I am considering moving to the Mac platform. I like the HW a lot, I like OS X a lot. I have browsed through various blogs, forums and articles on Java on Mac and from what I've read it seems that the future of Java on Mac is somehow unsure... at least in compare with Win and Linux.
So, my question is: given I'm a web developer who works with Java EE, you know, Eclipse, Tomcat/Jetty, Spring and the stuff, is it wise and practical to get a Mac? I mean, am I going to have to sell it in a few years simply because Apple will became virtually ignorant of the Java platform... or am I too pesimistic? :) And is Java 6 on Mac in a condition suitable for Java EE development?
Thanks for all your thoughts...
Dan

kajbj wrote:
And is Java 6 on Mac in a condition suitable for Java EE development?That's one of the drawbacks. New JDK releases are lagging behind the other platforms.Out of curiosity I google if there is any work for getting the OpenJDK to run on Mac OS X and [indeed there is|http://landonf.bikemonkey.org/code/macosx/FreeBSD_Java_16_Status_Update.20071112.html]. So it seems that at least for development up-to-date JDKs will no longer be as rare as they used to be for those Macs.

Similar Messages

  • HTML/Java/J2ee IDE / Dev WEB app

    I am creating one web application using Java/J2EE. My web page would contain menu and sub menu system.
    I have to use HTML/JSP/Servlet/EJB/SQL Server.
    For HTML I am using dream weaver and for java code notepad.
    I want to use some GUI tool to develop this application.
    1.     GUI for developing HTML page and text editor for Java code with drag and drop facility for HTML and JAVA/J2ee both with easy integration between these two technology components.
    Or
    2.     Any single GUI tool which provide HTML and JAVA/J2EE editor and drag and drop facility for HTML and JAVA/J2ee both.
    Please help me by suggesting!

    Now, with all this added complexity, what was the
    point. I kinda thought it was to create a standard, so
    that deployment was easy.I agree that deployment is not as easy as you would like it to be. However most of this added complexity is to handle situations consistently. And nowadays there are plenty of tools available (my Company makes one), which can simplify the deployment.
    Can anyone out there tell me why we should conform to
    these standards if the web app servers
    won't!!!!!!!!!!!!!!!!!!!!!!!!!That is not how it should be, I agree. While building OptimalJ (the tool we make)we experienced differences between app servers as well. However again, there are tools which make this easier for you (although I don't think they solve it completely yet...).
    Hopefully we end up in a situation where all EAR files can be interchanged more easily.
    Regards,
    Michiel.

  • Howto about how install Java J2EE on MacOS Leopard ???

    Hi
    Does anybody knows how i can install java j2EE on Mac OS Leopard???
    And for example, if my computer have and old version of java, what are the steps that i need to do for update to the latest version?
    I hope somebody knows, and thanks so much !!

    There are many versions of [Java EE|http://java.sun.com/javaee/] (formerly known as J2EE) and many implementations of each version of JEE. If you're just using it to learn and have no other political, customer, management, or other requirements to worry about, I recommend using the [GlassFish JEE server|https://glassfish.dev.java.net/], which is [Java EE 5|http://java.sun.com/javaee/5/docs/tutorial/doc/JavaEETutorial.pdf] compliant. I have not installed GlassFish on a Mac, but the post [GlassFish on Mac OS 10.5 Leopard|http://blog.ejeklint.se/2008/02/15/glassfish-on-mac-os-105-leopard/] looks useful. The [download page|http://java.sun.com/javaee/downloads/index.jsp] will even let you download the GlassFish implementation along with a new JDK (Java SE).

  • Unable to calculate correct C-MAC for doing EXTERNAL AUTHENTICATE

    I’m facing a problem successfully executing the EXTERNAL_AUTHENTICATE command for establishing a secure session. I get a 69 82 response meaning “Security status not satisfied”. I have concluded that the C-MAC I’m computing must somehow be wrong, because when I walked through the a tutorial file given to us, I’m not able to arrive at the same C-MAC value illustrated in the document .
    Command : 84 82 01 00 10
    Input Data : F6 17 A4 CB 36 80 F3 37 (Host cryptogram)
    For the above data the C-MAC computed is shown as “3F 67 D7 B5 0C 0D 9C 60” using the S-MAC key AD79403568BE1B46250E389475D2BD7E but I’m arriving at a S-MAC key value of “98 18 0c 25 38 ad 54 8c” using the same key and a padding of 8000000000000000000000
    I’m pasting below a sample program that shows how I’m arriving at this value. Can you please help me understand what they are doing differently to arrive at the values that only work with the card?
    Thanks
    Kannan
    import java.security.InvalidAlgorithmParameterException;
    import java.security.InvalidKeyException;
    import java.security.NoSuchAlgorithmException;
    import javax.crypto.BadPaddingException;
    import javax.crypto.Cipher;
    import javax.crypto.IllegalBlockSizeException;
    import javax.crypto.NoSuchPaddingException;
    import javax.crypto.spec.IvParameterSpec;
    import javax.crypto.spec.SecretKeySpec;
    public class Cryptogram
    public static byte[] hexToBuffer(String hexString) throws NumberFormatException
              int length = hexString.length();
              byte[] buffer = new byte[(length+1)/2];
              boolean evenByte = true;
              byte nextByte = 0;
              int bufferOffset = 0;
              if ((length%2)==1)
                   evenByte = false;
              for (int i=0; i<length; i++) {
                   char c = hexString.charAt(i);
                   int nibble;
                   if ((c>='0')&&(c<='9'))
                        nibble = c - '0';
                   else if ((c>='A')&&(c<='F'))
                        nibble = c - 'A' + 0x0A;
                   else if ((c>='a')&&(c<='f'))
                        nibble = c - 'a' + 0x0A;
                   else throw new NumberFormatException("Invalid hex digit '"+c+"'.");
                   if (evenByte) {
                        nextByte = (byte)(nibble<<4);
                   } else {
                        nextByte += (byte)nibble;
                        buffer[bufferOffset++] = nextByte;
                   evenByte = !evenByte;
              return buffer;
    private static SecretKeySpec getKeySpec(byte[] key) {
    if (key.length == 16) {
    byte[] key24 = new byte[24];
    System.arraycopy(key,0,key24,0,16);
    System.arraycopy(key,0,key24,16,8);
    return new SecretKeySpec(key24,"DESede");
    } else {
    return new SecretKeySpec(key,"DESede");
    public static byte[] cbcMac(byte[] data,byte[] sessKey) throws NoSuchAlgorithmException, NoSuchPaddingException, InvalidKeyException, InvalidAlgorithmParameterException, IllegalBlockSizeException, BadPaddingException {
    byte[] temp;
    Cipher cbcDES = Cipher.getInstance("DESede/CBC/NoPadding");
    byte[] DEFAULT_ICV = new byte[8];
    IvParameterSpec params = new IvParameterSpec(DEFAULT_ICV);                         
    cbcDES.init(Cipher.ENCRYPT_MODE, getKeySpec(sessKey), params);
    temp = cbcDES.doFinal(data);
    byte[] signature = new byte[8];
    System.arraycopy(temp, temp.length - 8, signature, 0, signature.length);
    return signature;
    public static void main(String args[]) throws Exception
    byte[] toSign = HexString.hexToBuffer("8482010010f617a4cb3680f3378000000000000000000000");
              byte[] sessKey = HexString.hexToBuffer("AD79403568BE1B46250E389475D2BD7E");
              byte[] cryptogram = cbcMac(toSign,sessKey);
              System.out.println("Cryptogram=" + HexString.bufferToHex(cryptogram));
    }

    user4928701 wrote:
    I don't know the format you are mentioning, I'm using oberthur v7 card.
    I realized that the mistake was in the padding of "8482010010f617a4cb3680f3378000000000000000000000";
    I'm supposed to pad only with 800000 as that gives a number of bytes in multiple of 8, but I had added yet another 0 sequence of 8 bytes.
    The format for external authenticate is 5 byte command + host cryptogram + C-MAC value for the padded sequence computed using S-MAC key.Then you are using the wrong code. The code you posted is for generating the host cryptogram. The code for the MAC for each command (including EXT AUTH) is different.
    Cheers,
    Shane

  • Looking to get a mac for fall semester, have a few questions on which one I should get.

    Hello everyone, this is the first time im posting here and i hope i can get some help. Im in the need of a new computer; I have been wanting a mac for a long time and i figured since im a junior in college that i should get myself something decent to finish school with. Any who i have been thinking about getting a refurbished mac for a while now, to me saving a few bucks is always a plus. I was just wondering though, do you guys think i should get one of those older products or maybe get one of the newer models just announced at wwdc? I had my eye out on a macbook pro, but the air has also been looking really nice. Im really having a tough time trying to decide which one i want get. This will be my main computer btw, and i currently do have an iphone and ipad 2 to go along with it. Here are the notebooks i was considering and also i usually will not be carrying it around campus that much.
    macbook pro 13in http://http://store.apple.com/us/product/FD313LL/A
    macbook air 13in http://http://store.apple.com/us/product/FC965LL/A
    macbook air 11in http://http://store.apple.com/us/product/FC969LL/A
    Hopefully you guys can help me out, im really looking forward to owning a mac. If it wasnt for the os, i wouldnt be considering one, but i just fell in love with it when one of my high school teachers was showing some of the things he could do with his mac. Also if anyone has any other suggestions, please tell me, im all up for new ideas.

    I'm in exactly the same boat as you... gonna be using it as my primary computer, graduating college soon, and my first mac. I'll be going with the 13 inch MacBook Air.
    The Pro and the Air are nearly identical performance-wise and so that means the only advantage of the Pro is the storage space (unless you count the cd drive as an advantage). The Air is way more portable and has a better display, I don't know about you but my current cd drive rarely gets used so might as well get rid of it.
    I have also compared them side-by-side in the store and that was really what won me over to the Air. The 11-inch Air was there too but the screen just seems too small, especially if you are doing work/writing essays etc.
    Hope that helped

  • Oracle ADF/BC4J vs "other" Java/J2ee technologies. Influence a decision

    Dear All,
    Our dev group is now at the stage when we need to make a decision which way to go - "proprietary" Oracle ADF/BC4J route or open source/java/j2ee standard. In our group we have a mix of Oracle Foms, pl/sql and java developers. The problem is that our core java developers are strictly against any proprietary thing, and they do not really want to even take a look at ADF/BC4J claiming that when it comes to resolving performance and other issues we will be better off with open source, rather than depend on Oracle...
    I am coming from an Oracle centric world, and to me ADF is a natural choice, however I do not have a lot of experience in Java/J2EE to post a strong argument for or against ADF and BC4J.
    I am just wondering if there is a case study, or comprehensive cons and pros for one or the other path.
    I will greatly appreciate anyone's answer.
    Thank you,
    VO

    "When it comes resolving performance and other issues we will be better off with open source."Really? How - are they planning to go into the hibernate/spring engine and fix the problems? Or do they have a specific "support" contract with some company that will guarantee them fixes to these issues? If they do have such a contract how much does this support costs the organization?
    Where is the notion that open-source is faster coming from? Certainly not from actual benchmarks like this one: http://www.spec.org/jAppServer2004/results/
    As Frank said your management might want to look into a more complete picture than what your Java developers are looking at.
    For example, given that you have Forms based developers, how fast can they get up to speed with the open source solution vs the ADF solution?
    I think a simple benchmark of productivity when building an application with the stack they are offering vs the ADF stack would prove the point even better.
    Don't have time to run one have a look at the RAD Race results from this year where ADF based team beat up Spring based teams.
    http://www.bloggingaboutoracle.org/archives/javapolis-radrace-the-full-story
    and
    http://www.radrace.org/en/JPed_2006/JP_report_2006.html#

  • What is the best mac for me? (budget: 1299$)

    What is the best mac for me? I will use it for:
    - Game programming and development
    - School research
    - Word proccessing
    - Presentations
    - Programming in Java
    - Programming in C++
    - Programming Iphone games and Objective-C
    - Gaming
    So can you tell me as fast as you can, my budget is 1299$

    FYI:  Macs are not gaming machines. 
    PERSONAL OPINION:  Nothing beats Microsoft (PCs) and/or Sony when it comes to gaming.  Macs can play games.  However, if you are a gamer, get a PC.

  • I received a phishing email from what I thought was my bank.  Do I need to do anything to my MAC for security?

    I received a phishing email from what I thought was my bank.  Do I need to do anything to my MAC for security? I have no anti-virus software.

    Evelyn, there is nothing that can prevent you or anyone from falling victim to those attempts to defraud you – other than you.
    "Phishing" scams are the most common way of getting people to voluntarily supply information that should be kept as secure as any other personal possession. "Anti-virus" solutions can't possibly prevent that sort of fraud, and if anything can only lull you into falsely believing you're being protected from threats, be they real or perceived.
    Do you have any further advice so that I don't fear my Mac?
    There is no reason to fear your Mac; it's a tool to be used for your sole benefit. Like any tool though, it can be misused. If there is any explanation for fear, it's a lack of education. Knowledge conquers fear and renders it inert. Learn what real threats actually exist, how to defend yourself from them, and how to distinguish them from those propagated by fear mongering psychopaths that justify their existence by keeping others misinformed. There are an abundance of the latter.
    There will always be threats to your information security associated with using any Internet - connected communications tool:
    You can mitigate those threats by following commonsense practices
    Delegating that responsibility to software is an ineffective defense
    Assuming that any product will protect you from those threats is a hazardous attitude that is likely to result in neglecting point #1 above.
    OS X already includes everything it needs to protect itself from viruses and malware. Keep it that way with software updates from Apple.
    A much better question is "how should I protect my Mac":
    Never install any product that claims to "clean up", "speed up",  "optimize", "boost" or "accelerate" your Mac; to "wash" it, "tune" it, or to make it "shiny". Those claims are absurd.Such products are very aggressively marketed. They are all scams.
    Never install pirated or "cracked" software, software obtained from dubious websites, or other questionable sources.
    Illegally obtained software is almost certain to contain malware.
    "Questionable sources" include but are not limited to spontaneously appearing web pages or popups, download hosting sites such as C net dot com, Softonic dot com, Soft pedia dot com, Download dot com, Mac Update dot com, or any other site whose revenue is primarily derived from junk product advertisements
    If you need to install software that isn't available from the Mac App Store, obtain it only from legitimate sources authorized by the software's developer.
    Don’t supply your password in response to a popup window requesting it, unless you know what it is and the reason your credentials are required.
    Don’t open email attachments from email addresses that you do not recognize, or click links contained in an email:
    Most of these are scams that direct you to fraudulent sites that attempt to convince you to disclose personal information.
    Such "phishing" attempts are the 21st century equivalent of a social exploit that has existed since the dawn of civilization. Don’t fall for it.
    Apple will never ask you to reveal personal information in an email. If you receive an unexpected email from Apple saying your account will be closed unless you take immediate action, just ignore it. If your iCloud, iTunes, or App Store account becomes disabled for valid reasons, you will know when you try to buy something or log in to this support site, and are unable to.
    Don’t install browser extensions unless you understand their purpose. Go to the Safari menu > Preferences > Extensions. If you see any extensions that you do not recognize or understand, simply click the Uninstall button and they will be gone.
    Don’t install Java unless you are certain that you need it:
    Java, a non-Apple product, is a potential vector for malware. If you are required to use Java, be mindful of that possibility.
    Java can be disabled in System Preferences.
    Despite its name JavaScript is unrelated to Java. No malware can infect your Mac through JavaScript. It’s OK to leave it enabled.
    Beware spontaneous popups: Safari menu > Preferences > Security > check "Block popup windows".
    Popup windows are useful and required for some websites, but unsolicited popups are commonly used to deceive people into installing unwanted software they would never intentionally install.
    Popups themselves cannot infect your Mac, but many contain resource-hungry code that will slow down Internet browsing.
    If you ever receive a popup window indicating that your Mac is infected with some ick or that you won some prize, it is 100% fraudulent. Ignore it. The more insistent it is that you upgrade or install something, the more likely it is to be a scam. Close the window or tab and forget it.
    Ignore hyperventilating popular media outlets that thrive by promoting fear and discord with entertainment products arrogantly presented as "news". Learn what real threats actually exist and how to arm yourself against them:
    The most serious threat to your data security is phishing. Most of these attempts are pathetic and are easily recognized, but that hasn't stopped prominent public figures from recently succumbing to this age-old scam.
    OS X viruses do not exist, but intentionally malicious or poorly written code, created by either nefarious or inept individuals, is nothing new.
    Never install something without first knowing what it is, what it does, how it works, and how to get rid of it when you don’t want it any more.
    If you elect to use "anti-virus" software, familiarize yourself with its limitations and potential to cause adverse effects, and apply the principle immediately preceding this one.
    Most such utilities will only slow down and destabilize your Mac while they look for viruses that do not exist, conveying no benefit whatsoever - other than to make you "feel good" about security, when you should actually be exercising sound judgment, derived from accurate knowledge, based on verifiable facts.
    Do install updates from Apple as they become available. No one knows more about Macs and how to protect them than the company that builds them.
    Summary: Use common sense and caution when you use your Mac, just like you would in any social context. There is no product, utility, or magic talisman that can protect you from all the evils of mankind.

  • /JOB/ DC - Java , J2EE **  Weblogic**, Sybase/oracle, Swing, Solaris/Unix, NT.

    All,
    Let me know if you're interested, I'll supply contact details
    =============================================
    A major financial services company in the D.C. area that
    is looking for Java developers with 5 + years experience
    in web dev/ internet technologies (Java 2 Certification
    strongly preferred ) and one or more of the following:
    Java , J2EE ** Weblogic**, Sybase/oracle, Swing, Solaris/Unix, NT.
    You will be responsible for defining and documenting
    requirements and developing solutions to business problems.
    Design Develop, upgrade, test, implement and document software
    components of client/server applications and/or internet/web
    based systems. Contribute to all phases of the software
    development cycle.
    =============================================
    Slava

    You have to create a datasource on WebLogicb with the JNDI name: jdbc/ADFDBDS
    The steps involved to create a datasource can be found here: http://download.oracle.com/docs/cd/E17904_01/apirefs.1111/e13952/taskhelp/jdbc/jdbc_datasources/CreateDataSources.html

  • How can i scan my mac for virus's

    I download alot of music (not from stupid or untrusted sites) and torrents (mostly movies and music and software) but nothing stupid that i know for sure will infect my Macbook Air............but just to be on the safe side i want to know if their is a safe way i can scan my mac for a virus? from my personal experience anti virus's do more harm than good  Suggestion? SOLUTIONS?

    1. This procedure is a diagnostic test. It changes nothing, for better or worse, and therefore will not, in itself, solve the problem. But with the aid of the test results, the solution may take a few minutes, instead of hours or days.
    Don't be put off by the complexity of these instructions. The process is much less complicated than the description. You do harder tasks with the computer all the time.
    2. If you don't already have a current backup, back up all data before doing anything else. The backup is necessary on general principle, not because of anything in the test procedure. Backup is always a must, and when you're having any kind of trouble with the computer, you may be at higher than usual risk of losing data, whether you follow these instructions or not.
    There are ways to back up a computer that isn't fully functional. Ask if you need guidance.
    3. Below are instructions to run a UNIX shell script, a type of program. As I wrote above, it changes nothing. It doesn't send or receive any data on the network. All it does is to generate a human-readable report on the state of the computer. That report goes nowhere unless you choose to share it. If you prefer, you can read it yourself without disclosing the contents to me or anyone else.
    You should be wondering whether you can believe me, and whether it's safe to run a program at the behest of a stranger. In general, no, it's not safe and I don't encourage it.
    In this case, however, there are a couple of ways for you to decide whether the program is safe without having to trust me. First, you can read it. Unlike an application that you download and click to run, it's transparent, so anyone with the necessary skill can verify what it does.
    You may not be able to understand the script yourself. But variations of the script have been posted on this website thousands of times over a period of years. The site is hosted by Apple, which does not allow it to be used to distribute harmful software. Any one of the millions of registered users could have read the script and raised the alarm if it was harmful. Then I would not be here now and you would not be reading this message.
    Nevertheless, if you can't satisfy yourself that these instructions are safe, don't follow them. Ask for other options.
    4. Here's a summary of what you need to do, if you choose to proceed:
    ☞ Copy a line of text in this window to the Clipboard.
    ☞ Paste into the window of another application.
    ☞ Wait for the test to run. It usually takes a few minutes.
    ☞ Paste the results, which will have been copied automatically, back into a reply on this page.
    The sequence is: copy, paste, wait, paste again. You don't need to copy a second time. Details follow.
    5. You may have started the computer in "safe" mode. Preferably, these steps should be taken in “normal” mode, under the conditions in which the problem is reproduced. If the system is now in safe mode and works well enough in normal mode to run the test, restart as usual. If you can only test in safe mode, do that.
    6. If you have more than one user, and the one affected by the problem is not an administrator, then please run the test twice: once while logged in as the affected user, and once as an administrator. The results may be different. The user that is created automatically on a new computer when you start it for the first time is an administrator. If you can't log in as an administrator, test as the affected user. Most personal Macs have only one user, and in that case this section doesn’t apply. Don't log in as root.
    7. The script is a single long line, all of which must be selected. You can accomplish this easily by triple-clicking anywhere in the line. The whole line will highlight, though you may not see all of it in the browser window, and you can then copy it. If you try to select the line by dragging across the part you can see, you won't get all of it.
    Triple-click anywhere in the line of text below on this page to select it:
    PATH=/usr/bin:/bin:/usr/sbin:/sbin:/usr/libexec;clear;cd;p=(Software Hardware Memory Diagnostics Power FireWire Thunderbolt USB Fonts SerialATA 4 1000 25 5120 KiB/s 1024 85 \\b%% 20480 1 MB/s 25000 ports ' com.clark.\* \*dropbox \*GoogleDr\* \*k.AutoCAD\* \*k.Maya\* vidinst\* ' DYLD_INSERT_LIBRARIES\ DYLD_LIBRARY_PATH -86 "` route -n get default|awk '/e:/{print $2}' `" 25 N\\/A down up 102400 25600 recvfrom sendto CFBundleIdentifier 25 25 25 1000 MB com.apple.AirPortBaseStationAgent 464843899 51 5120 files );N5=${#p[@]};p[N5]=` networksetup -listnetworkserviceorder|awk ' NR>1 { sub(/^\([0-9]+\) /,"");n=$0;getline;} $NF=="'${p[26]}')" { sub(/.$/,"",$NF);print n;exit;} ' `;f=('\n%s: %s\n' '\n%s\n\n%s\n' '\nRAM details\n%s\n' %s\ %s '%s\n-\t%s\n' );S0() { echo ' { q=$NF+0;$NF="";u=$(NF-1);$(NF-1)="";gsub(/^ +| +$/,"");if(q>='${p[$1]}') printf("%s (UID %s) is using %s '${p[$2]}'",$0,u,q);} ';};s=(' /^ *$|CSConfigDot/d;s/^ */   /;s/[-0-9A-Fa-f]{22,}/UUID/g;s/(ochat)\.[^.]+(\..+)/\1\2/;/Shared/!s/\/Users\/[^/]+/~/g ' ' s/^ +//;/de: S|[nst]:/p;' ' {sub(/^ +/,"")};/er:/;/y:/&&$2<'${p[10]} ' 1s/://;3,6d;/[my].+:/d;s/^ {4}//;H;${ g;s/\n$//;/s: [^EO]|x([^08]|02[^F]|8[^0])/p;} ' ' 5h;6{ H;g;/P/!p;} ' ' ($1~/^Cy/&&$3>'${p[11]}')||($1~/^Cond/&&$2!~/^N/) ' ' /:$/{ N;/:.+:/d;s/ *://;b0'$'\n'' };/^ *(V.+ [0N]|Man).+ /{ s/ 0x.... //;s/[()]//g;s/(.+: )(.+)/ (\2)/;H;};$b0'$'\n'' d;:0'$'\n'' x;s/\n\n//;/Apple[ ,]|Genesy|Intel|SMSC/d;s/\n.*//;/\)$/p;' ' s/^.*C/C/;H;${ g;/No th|pms/!p;} ' '/= [^GO]/p' '{$1=""};1' ' /Of/!{ s/^.+is |\.//g;p;} ' ' $0&&!/ / { n++;print;} END { if(n<200) print "com.apple.";} ' ' $3~/[0-9]:[0-9]{2}$/ { gsub(/:[0-9:a-f]{14}/,"");} { print|"tail -n'${p[12]}'";} ' ' NR==2&&$4<='${p[13]}' { print $4;} ' ' END { $2/=256;if($2>='${p[15]}') print int($2) } ' ' NR!=13{next};{sub(/[+-]$/,"",$NF)};'"`S0 21 22`" 'NR!=2{next}'"`S0 37 17`" ' NR!=5||$8!~/[RW]/{next};{ $(NF-1)=$1;$NF=int($NF/10000000);for(i=1;i<=3;i++){$i="";$(NF-1-i)="";};};'"`S0 19 20`" 's:^:/:p' '/\.kext\/(Contents\/)?Info\.plist$/p' 's/^.{52}(.+) <.+/\1/p' ' /Launch[AD].+\.plist$/ { n++;print;} END { print "'${p[41]}'";if(n<200) print "/System/";} ' '/\.xpc\/(Contents\/)?Info\.plist$/p' ' NR>1&&!/0x|\.[0-9]+$|com\.apple\.launchctl\.(Aqua|Background|System)$|'${p[41]}'/ { print $3;} ' ' /\.(framew|lproj)|\):/d;/plist:|:.+(Mach|scrip)/s/:[^:]+//p ' '/^root$/p' ' !/\/Contents\/.+\/Contents|Applic|Autom|Frameworks/&&/Lib.+\/Info.plist$/ { n++;print;} END { if(n<1100) print "/System/";} ' '/^\/usr\/lib\/.+dylib$/p' ' /Temp|emac/{next};/(etc|Preferences|Launch[AD].+)\// { sub(".(/private)?","");n++;print;} END { print "'${p[41]}'.plist\t'${p[42]}'";if(n<500) print "Launch";} ' ' /\/(Contents\/.+\/Contents|Frameworks)\/|\.wdgt\/.+\.([bw]|plu)/d;p;' 's/\/(Contents\/)?Info.plist$//;p' ' { gsub("^| |\n","\\|\\|kMDItem'${p[35]}'=");sub("^...."," ") };1 ' p '{print $3"\t"$1}' 's/\'$'\t''.+//p' 's/1/On/p' '/Prox.+: [^0]/p' '$2>'${p[43]}'{$2=$2-1;print}' ' BEGIN { i="'${p[26]}'";M1='${p[16]}';M2='${p[18]}';M3='${p[31]}';M4='${p[32]}';} !/^A/{next};/%/ { getline;if($5<M1) a="user "$2"%, system "$4"%";} /disk0/&&$4>M2 { b=$3" ops/s, "$4" blocks/s";} $2==i { if(c) { d=$3+$4+$5+$6;next;};if($4>M3||$6>M4) c=int($4/1024)" in, "int($6/1024)" out";} END { if(a) print "CPU: "a;if(b) print "I/O: "b;if(c) print "Net: "c" (KiB/s)";if(d) print "Net errors: "d" packets/s";} ' ' /r\[0\] /&&$NF!~/^1(0|72\.(1[6-9]|2[0-9]|3[0-1])|92\.168)\./ { print $NF;exit;} ' ' !/^T/ { printf "(static)";exit;} ' '/apsd|BKAg|OpenD/!s/:.+//p' ' (/k:/&&$3!~/(255\.){3}0/ )||(/v6:/&&$2!~/A/ ) ' ' $1~"lR"&&$2<='${p[25]}';$1~"li"&&$3!~"wpa2";' ' BEGIN { FS=":";p="uniq -c|sed -E '"'s/ +\\([0-9]+\\)\\(.+\\)/\\\2 x\\\1/;s/x1$//'"'";} { n=split($3,a,".");sub(/_2[01].+/,"",$3);print $2" "$3" "a[n]$1|p;b=b$1;} END { close(p);if(b) print("\n\t* Code injection");} ' ' NR!=4{next} {$NF/=10240} '"`S0 27 14`" ' END { if($3~/[0-9]/)print$3;} ' ' BEGIN { L='${p[36]}';} !/^[[:space:]]*(#.*)?$/ { l++;if(l<=L) f=f"\n   "$0;} END { F=FILENAME;if(!F) exit;if(!f) f="\n   [N/A]";"file -b "F|getline T;if(T!~/^(AS.+ (En.+ )?text$|(Bo|PO).+ sh.+ text ex)/) F=F" ("T")";printf("\nContents of %s\n%s\n",F,f);if(l>L) printf("\n   ...and %s more line(s)\n",l-L);} ' ' BEGIN{FS="= "} /Name/{print $2} ' 's/0/Off/p' ' END{print NR} ' ' /id: N|te: Y/{i++} END{print i} ' ' / / { print "'"${p[28]}"'";exit;};1;' '/ en/!s/\.//p' ' NR!=13{next};{sub(/[+-M]$/,"",$NF)};'"`S0 39 40`" ' $10~/\(L/&&$9!~"localhost" { sub(/.+:/,"",$9);print $1": "$9;} ' '/^ +r/s/.+"(.+)".+/\1/p' 's/(.+\.wdgt)\/(Contents\/)?Info\.plist$/\1/p' 's/^.+\/(.+)\.wdgt$/\1/p' ' /l: /{ /DVD/d;s/.+: //;b0'$'\n'' };/s: /{ /V/d;s/^ */- /;H;};$b0'$'\n'' d;:0'$'\n'' x;/APPLE [^:]+$/d;p;' ' /^find: /d;p;' "`S0 44 45`" );c1=(system_profiler pmset\ -g nvram fdesetup find syslog df vm_stat sar ps sudo\ crontab sudo\ iotop top pkgutil 'PlistBuddy 2>&1 -c "Print' whoami cksum kextstat launchctl sudo\ launchctl crontab 'sudo defaults read' stat lsbom mdfind ' for i in ${p[24]};do ${c1[18]} ${c2[27]} $i;done;' defaults\ read scutil sudo\ dtrace sudo\ profiles sed\ -En awk /S*/*/P*/*/*/C*/*/airport networksetup mdutil sudo\ lsof test );c2=(com.apple.loginwindow\ LoginHook '" /L*/P*/loginw*' '" L*/P*/*loginit*' 'L*/Ca*/com.ap*.Saf*/E*/* -d 1 -name In*t -exec '"${c1[14]}"' :CFBundleDisplayName" {} \;|sort|uniq' '~ $TMPDIR.. \( -flags +sappnd,schg,uappnd,uchg -o ! -user $UID -o ! -perm -600 \)' '.??* -path .Trash -prune -o -type d -name *.app -print -prune' :${p[35]}\" :Label\" '{/,}L*/{Con,Pref}* -type f ! -size 0 -name *.plist -exec plutil -s {} \;' "-f'%N: %l' Desktop L*/Keyc*" therm sysload boot-args status " -F '\$Time \$Message' -k Sender kernel -k Message Req 'bad |Beac|caug|dead[^bl]|FAIL|fail|GPU |hfs: Ru|inval|jnl:|last value [1-9]|n Cause: -|NVDA\(|pagin|proc: t|Roamed|rror|ssert|Thrott|tim(ed? ?|ing )o|WARN' -k Message Rne 'Goog|ksadm|SMC:| VALI|xpma' -o -k Sender fseventsd -k Message Req 'SL' " '-du -n DEV -n EDEV 1 10' 'acrx -o comm,ruid,%cpu' '-t1 10 1' '-f -pfc /var/db/r*/com.apple.*.{BS,Bas,Es,J,OSXU,Rem,up}*.bom' '{/,}L*/Lo*/Diag* -type f -regex .\*[cgh] ! -name *ag \( -exec grep -lq "^Thread c" {} \; -exec printf \* \; -o -true \) -execdir stat -f:%Sc:%N -t%F {} \;|sort -t: -k2 |tail -n'${p[38]} '-L {/{S*/,},}L*/Lau* -type f' '-L /{S*/,}L*/StartupItems -type f -exec file {} +' '-L /S*/L*/{C*/Sec*A,E}* {/,}L*/{A*d,Ca*/*/Ex,Co{mpon,reM},Ex,Inter,iTu*/*P,Keyb,Mail/B,Pr*P,Qu*T,Scripti,Sec,Servi,Spo,Widg}* -path \\*s/Resources -prune -o -type f -name Info.plist' '/usr/lib -type f -name *.dylib' `awk "${s[31]}"<<<${p[23]}` "/e*/{auto,{cron,fs}tab,hosts,{[lp],sy}*.conf,pam.d/*,ssh{,d}_config,*.local} {,/usr/local}/etc/periodic/*/* /L*/P*{,/*}/com.a*.{Bo,sec*.ap}*t /S*/L*/Lau*/*t .launchd.conf" list getenv /Library/Preferences/com.apple.alf\ globalstate --proxy '-n get default' -I --dns -getdnsservers\ "${p[N5]}" -getinfo\ "${p[N5]}" -P -m\ / '' -n1 '-R -l1 -n1 -o prt -stats command,uid,prt' '--regexp --only-files --files com.apple.pkg.*|sort|uniq' -kl -l -s\ / '-R -l1 -n1 -o mem -stats command,uid,mem' '+c0 -i4TCP:0-1023' com.apple.dashboard\ layer-gadgets '-d /L*/Mana*/$USER&&echo On' '-app Safari WebKitDNSPrefetchingEnabled' "+c0 -l|awk '{print(\$1,\$3)}'|sort|uniq -c|sort -n|tail -1|awk '{print(\$2,\$3,\$1)}'" );N1=${#c2[@]};for j in {0..9};do c2[N1+j]=SP${p[j]}DataType;done;N2=${#c2[@]};for j in 0 1;do c2[N2+j]="-n ' syscall::'${p[33+j]}':return { @out[execname,uid]=sum(arg0) } tick-10sec { trunc(@out,1);exit(0);} '";done;l=(Restricted\ files Hidden\ apps 'Elapsed time (s)' POST Battery Safari\ extensions Bad\ plists 'High file counts' User Heat System\ load boot\ args FileVault Diagnostic\ reports Log 'Free space (MiB)' 'Swap (MiB)' Activity 'CPU per process' Login\ hook 'I/O per process' Mach\ ports kexts Daemons Agents launchd Startup\ items Admin\ access Root\ access Bundles dylibs Apps Font\ issues Inserted\ dylibs Firewall Proxies DNS TCP/IP Wi-Fi Profiles Root\ crontab User\ crontab 'Global login items' 'User login items' Spotlight Memory Listeners Widgets Parental\ Controls Prefetching SATA Descriptors );N3=${#l[@]};for i in 0 1 2;do l[N3+i]=${p[5+i]};done;N4=${#l[@]};for j in 0 1;do l[N4+j]="Current ${p[29+j]}stream data";done;A0() { id -G|grep -qw 80;v[1]=$?;((v[1]==0))&&sudo true;v[2]=$?;v[3]=`date +%s`;clear >&-;date '+Start time: %T %D%n';};for i in 0 1;do eval ' A'$((1+i))'() { v=` eval "${c1[$1]} ${c2[$2]}"|'${c1[30+i]}' "${s[$3]}" `;[[ "$v" ]];};A'$((3+i))'() { v=` while read i;do [[ "$i" ]]&&eval "${c1[$1]} ${c2[$2]}" \"$i\"|'${c1[30+i]}' "${s[$3]}";done<<<"${v[$4]}" `;[[ "$v" ]];};A'$((5+i))'() { v=` while read i;do '${c1[30+i]}' "${s[$1]}" "$i";done<<<"${v[$2]}" `;[[ "$v" ]];};';done;A7(){ v=$((`date +%s`-v[3]));};B2(){ v[$1]="$v";};for i in 0 1;do eval ' B'$i'() { v=;((v['$((i+1))']==0))||{ v=No;false;};};B'$((3+i))'() { v[$2]=`'${c1[30+i]}' "${s[$3]}"<<<"${v[$1]}"`;} ';done;B5(){ v[$1]="${v[$1]}"$'\n'"${v[$2]}";};B6() { v=` paste -d: <(printf "${v[$1]}") <(printf "${v[$2]}")|awk -F: ' {printf("'"${f[$3]}"'",$1,$2)} ' `;};B7(){ v=`grep -Fv "${v[$1]}"<<<"$v"`;};C0(){ [[ "$v" ]]&&echo "$v";};C1() { [[ "$v" ]]&&printf "${f[$1]}" "${l[$2]}" "$v";};C2() { v=`echo $v`;[[ "$v" != 0 ]]&&C1 0 $1;};C3() { v=`sed -E "$s"<<<"$v"`&&C1 1 $1;};for i in 1 2;do for j in 0 2 3;do eval D$i$j'(){ A'$i' $1 $2 $3; C'$j' $4;};';done;done;{ A0;D20 0 $((N1+1)) 2;D10 0 $N1 1;B0;C2 27;B0&&! B1&&C2 28;D12 15 37 25 8;A1 0 $((N1+2)) 3;C0;D13 0 $((N1+3)) 4 3;D23 0 $((N1+4)) 5 4;D13 0 $((N1+9)) 59 50;for i in 0 1 2;do D13 0 $((N1+5+i)) 6 $((N3+i));done;D13 1 10 7 9;D13 1 11 8 10;D22 2 12 9 11;D12 3 13 10 12;D23 4 19 44 13;D23 5 14 12 14;D22 6 36 13 15;D22 7 37 14 16;D23 8 15 38 17;D22 9 16 16 18;B1&&{ D22 35 49 61 51;D22 11 17 17 20;for i in 0 1;do D22 28 $((N2+i)) 45 $((N4+i));done;};D22 12 44 54 45;D22 12 39 15 21;A1 13 40 18;B2 4;B3 4 0 19;A3 14 6 32 0;B4 0 5 11;A1 17 41 20;B7 5;C3 22;B4 4 6 21;A3 14 7 32 6;B4 0 7 11;B3 4 0 22;A3 14 6 32 0;B4 0 8 11;B5 7 8;B1&&{ A2 19 26 23;B7 7;C3 23;};A2 18 26 23;B7 7;C3 24;A2 4 20 21;B7 6;B2 9;A4 14 7 52 9;B2 10;B6 9 10 4;C3 25;D13 4 21 24 26;B4 4 12 26;B3 4 13 27;A1 4 22 29;B7 12;B2 14;A4 14 6 52 14;B2 15;B6 14 15 4;B3 0 0 30;C3 29;A1 4 23 27;B7 13;C3 30;D13 24 24 32 31;D13 25 37 32 33;A2 23 18 28;B2 16;A2 16 25 33;B7 16;B3 0 0 34;B2 21;A6 47 21&&C0;B1&&{ D13 21 0 32 19;D13 10 42 32 40;D22 29 35 46 39;};D13 14 1 48 42;D12 34 43 53 44;D22 0 $((N1+8)) 51 32;D13 4 8 41 6;D12 26 28 35 34;D13 27 29 36 35;A2 27 32 39&&{ B2 19;A2 33 33 40;B2 20;B6 19 20 3;};C2 36;D23 33 34 42 37;B1&&D23 35 45 55 46;D23 32 31 43 38;D12 36 47 32 48;D13 20 42 32 41;D23 14 2 48 43;D13 4 5 32 1;D13 4 3 60 5;D12 26 48 49 49;B3 4 22 57;A1 26 46 56;B7 22;B3 0 0 58;C3 47;D22 4 4 50 0;D23 22 9 37 7;A7;C2 2;} 2>/dev/null|pbcopy;exit 2>&-
    Copy the selected text to the Clipboard by pressing the key combination command-C.
    8. Launch the built-in Terminal application in any of the following ways:
    ☞ Enter the first few letters of its name into a Spotlight search. Select it in the results (it should be at the top.)
    ☞ In the Finder, select Go ▹ Utilities from the menu bar, or press the key combination shift-command-U. The application is in the folder that opens.
    ☞ Open LaunchPad. Click Utilities, then Terminal in the icon grid.
    Click anywhere in the Terminal window and paste by pressing command-V. The text you pasted should vanish immediately. If it doesn't, press the return key.
    9. If you see an error message in the Terminal window such as "Syntax error" or "Event not found," enter
    exec bash
    and press return. Then paste the script again.
    10. If you're logged in as an administrator, you'll be prompted for your login password. Nothing will be displayed when you type it. You will not see the usual dots in place of typed characters. Make sure caps lock is off. Type carefully and then press return. You may get a one-time warning to be careful. If you make three failed attempts to enter the password, the test will run anyway, but it will produce less information. In most cases, the difference is not important. If you don't know the password, or if you prefer not to enter it, press the key combination control-C or just press return  three times at the password prompt. Again, the script will still run.
    If you're not logged in as an administrator, you won't be prompted for a password. The test will still run. It just won't do anything that requires administrator privileges.
    11. The test may take a few minutes to run, depending on how many files you have and the speed of the computer. A computer that's abnormally slow may take longer to run the test. While it's running, there will be nothing in the Terminal window and no indication of progress. Wait for the line
    [Process completed]
    to appear. If you don't see it within half an hour or so, the test probably won't complete in a reasonable time. In that case, close the Terminal window and report what happened. No harm will be done.
    12. When the test is complete, quit Terminal. The results will have been copied to the Clipboard automatically. They are not shown in the Terminal window. Please don't copy anything from there. All you have to do is start a reply to this comment and then paste by pressing command-V again.
    At the top of the results, there will be a line that begins with the words "Start time." If you don't see that, but instead see a mass of gibberish, you didn't wait for the "Process completed" message to appear in the Terminal window. Please wait for it and try again.
    If any private information, such as your name or email address, appears in the results, anonymize it before posting. Usually that won't be necessary.
    13. When you post the results, you might see an error message on the web page: "You have included content in your post that is not permitted," or "You are not authorized to post." That's a bug in the forum software. Please post the test results on Pastebin, then post a link here to the page you created.
    14. This is a public forum, and others may give you advice based on the results of the test. They speak only for themselves, and I don't necessarily agree with them.
    Copyright © 2014 by Linc Davis. As the sole author of this work, I reserve all rights to it except as provided in the Use Agreement for the Apple Support Communities website ("ASC"). Readers of ASC may copy it for their own personal use. Neither the whole nor any part may be redistributed.

  • My daughter is a college student. she needs to write and compile c programs on her mac for a class this semester. what is the best place for her to start to get the correct compiler etc. to use ? thanks

    my daughter is a college student. she needs to write and compile c programs on her mac for a class this semester. what is the best place for her to start to get the correct compiler etc. to use ? thanks

    If you know that you will not be asked to design GUI interfaces, and the C programming course will adhere to command line compilation environments, then get the Xcode command-line developer tools, and skip the extra complication of Xcode until you absolutely need it. Apple has kicked GNU C to the curb and is rightly so, using Clang/LLVM compiler technology.
    Sign up for a free Apple Developer account using your Apple ID, and then visit the Mac Dev Center, and towards the bottom of the page, you will see additional downloads. Click on the associated, all down loads link. Know your OS X version beforehand, as the command-line tool releases are tied to general operating system versions, and the most recent Xcode version.  That said, there are currently two March 9, 2015 command-line tools for Xcode 6.2 — one for OS X 10.9 Mavericks, and the other for OS X Yosemite.

  • Ideal age of a 2nd hand Mac for purchase?

    I'm in the market for a new computer. I'm currently running a rather old Windows machine. Mac's are highly desirable especially considering my profession (web designer/developer). However, the cost of a new one is out of the question. So, I was wondering what is the ideal 'age' of an iMac and/or a mac mini? I was thinking about 2-3 years old, but was wondering what you mac addicts think. I need something that will last me around 3-4 years ideally for under £400.
    £400 is based off the average cost of a new Windows machine + monitor.
    Thanks!

    You are very unlikely to get a 2 - 3 year old mac for £400.  The following prices are in dollars (of course) but it will give a loose guide to the drop in value percentage wise.
    MacPrices.net | Apple Mac, iPad, & iPod prices & reviews; Updated DailyMac2Sell - Argus, Evaluation,
    And if you are offered one, look it up here to get an idea of a fair price.
    Guide to used Mac, iPad, iPhone & iPod - Occasion

  • Should I switch to Mac for CF/Flex/SQL development?

    I'm contemplating a move to Mac for my local development
    environment. I have seen quite a number of people using Mac for
    CF/Flex/Flash development. Those are my primary programming
    platforms - though I'm planning on adding AJAX and .NET to my
    arsenal soon. I was wondering if anyone had any feedback on the
    benefits and drawbacks of switching to Mac:
    Do the IDEs (i.e. Flex Builder, Eclipse, Fireworks, etc.)
    work well?
    Are there any other important programs (i.e. Source Control,
    Wireframing/Mockups) that will (or will not) work well?
    What about database development? I'm used to SQL Server - can
    it run on a Mac? If so, how well does it work?
    Any other issues I should know about developing on a Mac?
    I know this is very vague, but I'm looking for any
    constructive feedback I can get, to help me make a wise decision.
    Thanks.
    Are there any other known issues with programming

    I wouldn't switch if you want to do .NET / SQL Server
    development. Most people on Macs who do SQL Server development
    either use a remote server or run it in a Windows Virtual Machine.
    Important programs are available for both OSes, but without
    knowing which ones you use it's hard to say whether you just need
    to install the "mac version" or whether you'd need to install a
    brand new one.

  • I've only had my iphone 5s for a week. I keep getting an error message of "Server has stopped responding."  I need the server to work. Does anyone know if there is a "fix" for the problem? Other wise, I probably best return for a refund and get a Samsung.

    I've only had my iphone 5s for a week. I keep getting an error message of "Server has stopped responding."  I need the server to work. Does anyone know if there is a "fix" for the problem? Other wise, I probably best return for a refund and get a Samsung.  Thanks

    sandyzotz wrote:
    Other wise, I probably best return for a refund and get a Samsung.
    Unlikely.  Based on the complete lack of detail of the issue provided it is entirely possible the same issue would occur.
    Unless and until the user provides some actual details of the problem, there is nothing the indicate that the issue is with the iPhone.

  • My iphone 4S has problem in making and receiving the calls. While making the call , call fails and netwrok disappears. Like wise no voice is heard for incoming calls. This happened after return from the overseas travel.

    My iphone 4S has problem in making and receiving the calls. While making the call , call fails and netwrok disappears. Like wise no voice is heard for incoming calls. This happened after return from the overseas travel.

    Hello SamSax
    Check out the assist page below for troubleshooting call connectivity.
    Calls and connection issues
    http://www.apple.com/support/iphone/assistant/calls/
    Thanks for using Apple Support Communities.
    Regards,
    -Norm G.

  • I'm too old to learn iCal.  How do I tell iTunes to synch with Outlook for Mac for all of the Contacts and the Calendar on my iPhone and iPad??  Thanks

    I'm too old to learn iCal.  How do I tell iTunes to synch with Outlook for Mac for all of the Contacts and the Calendar on my iPhone and iPad?? 
    Also, once I figure out how to replace iCal with Outlook/Mac on iTunes, how do I synch the phone and pad so that the information on those devices over-writes onto Outlook as a backup, rather than having a blank Calendar on Outlook wipe out all of the information on the phone and pad???
    Thanks

    If you haven't tried already, plug your devices into iTunes, and on each device next to the "Summary" tab at the top is another tab called "Info." Click that and scroll down to Contacts, Calendars, etc. There should be a pull down bar under each category for "Sync contacts from..." and you should be able to select from that pull down list Outlook.  Hit Apply at the bottom and see if that does it.

Maybe you are looking for