macOS Public Beta is now active, however; there are many articles out there telling users how to signup then leaving them short of getting the actual update.
I have been checking for days now and the update would not show up.. So I dug around and found the installer.
Continue reading macOS 10.13 High Sierra Public Beta
We’ve all ran into issues with our Macs, Yosemite has issues with upgrading and networking from feedback we’ve gotten from customers and have seen personally; and if you want to roll back to Mavericks, I suggest doing a clean install. Some might even find this handy before selling your existing Mac after getting a new one.
WARNING: Performing the following steps will permanently destroy data on your drive. Make sure you have backed up ALL important data before proceeding.
Here’s how to do it:
If you are getting rid of your machine.
iTunes → click
Deauthorize This Computer.
- Enter your AppleID and password and click
- You should also deauthorize any third-party apps, such as Photoshop, that are locked to your Mac.
Turn off File Vault
System preferences → click on
Security & Privacy → open the
- Check that it says
FileVault is turned off the for the disc [main hard drive].
- If not click on the padlock icon in the bottom left, enter your password and click on
Turn Off FileVault.
Sign out of iCloud
- Open System Preferences and click on
iCloud and tap on
Sign Out Now.
- To remove all your personal data click on
Delete From Mac
Wiping and Rebuilding
Wiping the Drive
- Boot into recovery mode by holding command + R keys before pressing the power button and holding it until the Utilities window appears.
Disk Utility → click
- Choose your main Volume → click
- Click the
Erase tab → click
Disk Utility →
Quit Disk Utility.
Re-Install OS X
NOTE: You will need and internet connection to proceed, we suggest using an Ethernet connection for this.
Reinstall OS X → click
- This will start a blank download of the OS X install files.
- If you are keeping the Mac, proceed with the install by using your AppleID.
- If you are not keeping it, do not use your Apple ID so that the next owner can finish the install with their AppleID.
What is the singularity?
I honestly was not aware of this topic so I set out to do some research to open my mind and man was my mind blown. Basically what I understand is that the singularity is a point in time when technology will surpass human intelligence and humans will start to become the minority in intelligence.
Vernor Vinge introduced the term Technological Singularity in his science fiction novel Marooned in Realtime(1986) and later developed the concept in his essay the Coming Technological Singularity (1993). His definition of Singularity is widely known as the event horizon thesis and in essence says that trans or post-human minds will imply a weirder future than we can imagine:
“Within thirty years, we will have the technological means to create superhuman intelligence. Shortly after, the human era will be ended. […] I think it’s fair to call this event a singularity. It is a point where our models must be discarded and a new reality rules. As we move closer and closer to this point, it will loom vaster and vaster over human affairs till the notion becomes a commonplace. Yet when it finally happens it may still be a great surprise and a greater unknown.” (1)
Continue reading The singularity – Will it Happen?
Ok folks, after many moons trying to fix this issue in Yosemite I finally got it… If you are running earlier versions of OSX, see here for the fix.
What am I talking about?
Append search domains for partially qualified domain names when performing DNS lookups. You know.. For example, you work in it and ssh to hosts regularly and your company uses
hostname.domain.com but you want to ssh to
hostname.sub to shave some time off your clock. With older versions you could apply a fix with mDNSResponder to work around whatever Apple decided to do there; around rolls Yosemite and they change the whole damn thing around. Continue reading Fix for broken search domain resolution in OS X Yosemite
Apple released their most recent update to their flagship OS that addresses issues many people were having to the point where some, including myself had to revert to Mavericks (sorry, did not do a write-up on that, was super busy with school and work). Basically, I was having drastic wireless connectivity issues that severely hindered my production, both at school and work. Continue reading OS X Yosemite v10.10.1 Update
The first patches for Shellshock didn’t offer complete protection. The latest revisions of this patch for the popular Mac OS X, Linux, and Unix bash shell security problem were released on Friday, offering greater defenses against hackers.
The problem with the first patch, as Red Hat explained in its Shellshock FAQ, was that it only took care of the original bash flaw CVE-2014-6271. This, the true Shellshock bug, is the worst bash security hole. There were also others.
Red Hat said: “Shortly after that issue went public a researcher found a similar flaw that wasn’t blocked by the first fix and this was assigned CVE-2014-7169.” This bug is also a security problem, but it’s not as bad as the other flaw.
Later, Red Hat Product Security researcher Florian Weimer found additional problems and these were designated CVE-2014-7186 and CVE-2014-7187. Fortunately, these bugs are less serious and the latest patch takes care of these as well. As Red Hat’s Huzaifa Sidhpurwala told me: “The latest version of bash fixes all the CVE issues.”
So, what you want to do now, if you haven’t already, is check to see if you’re running a vulnerable version of bash. Continue reading Shellshock: Better ‘bash’ patches now available
A bug discovered in the widely used Bash command interpreter poses a critical security risk to Unix and Linux systems – and, thanks to their ubiquity, the internet at large.
It lands countless websites, servers, PCs, OS X Macs, various home routers, and more, in danger of hijacking by hackers.
The vulnerability is present in Bash up to and including version 4.3, and was discovered by Stephane Chazelas. It puts Apache web servers, in particular, at risk of compromise: CGI scripts that use or invoke Bash in any way – including any child processes spawned by the scripts – are vulnerable to remote-code injection. OpenSSH and some DHCP clients are also affected on machines that use Bash.
Ubuntu and other Debian-derived systems that use Dash exclusively are not at risk – Dash isn’t vulnerable, but busted versions of Bash may well be present on the systems anyway. It’s essential you check the shell interpreters you’re using, and any Bash packages you have installed, and patch if necessary.
Security expert Kenn White tweeted:
You can check if you’re vulnerable by running the following lines in your default shell, which on many systems will be Bash. If you see the words “busted”, then you’re at risk. If not, then either your Bash is fixed or your shell is using another interpreter. Continue reading Bash ‘Shell Shock’ bug blasts OS X, Linux systems wide open