enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Disk Utility - Wikipedia

    en.wikipedia.org/wiki/Disk_Utility

    The ability to "zero" all data (multi-pass formatting) on a disk was not added until Mac OS X 10.2.3. [5] Further changes introduced in Mac OS X Tiger, specifically version 10.4.3, allowed Disk Utility to be used to verify the file structure of the current boot drive. Mac OS X Leopard added the ability to create, resize, and delete disk partitions

  3. Repair permissions - Wikipedia

    en.wikipedia.org/wiki/Repair_permissions

    In systems prior to OS X El Capitan, a permissions repair can be performed by selecting a startup volume and clicking the "Repair Disk Permissions" button in the "First Aid" section of Disk Utility. The operation can also be performed by using the diskutil command-line utility. [ 6 ]

  4. Apple Software Restore - Wikipedia

    en.wikipedia.org/wiki/Apple_Software_Restore

    Apple Software Restore or asr is a command line utility in Mac OS X used to apply a DMG disk image to a selected partition or mount point on a file system. It is often used for cloning large numbers of Macintosh computers. Apple Software Restore can read an image locally or from a server via HTTP or its own multicast asr:// URI.

  5. List of built-in macOS apps - Wikipedia

    en.wikipedia.org/wiki/List_of_built-in_macOS_apps

    Disk Utility is a system utility for performing disk and disk volume-related tasks. It can create, convert, backup, compress, and encrypt logical volume images from a wide range of formats, mount or unmount disk volumes , verify a disk's integrity and repair it if damaged, and erase, format, partition, or clone disks.

  6. System Integrity Protection - Wikipedia

    en.wikipedia.org/wiki/System_Integrity_Protection

    Apple says that System Integrity Protection is a necessary step to ensure a high level of security. In one of the WWDC developer sessions, Apple engineer Pierre-Olivier Martel described unrestricted root access as one of the remaining weaknesses of the system, saying that "[any] piece of malware is one password or vulnerability away from taking full control of the device".

  7. Command-line interface - Wikipedia

    en.wikipedia.org/wiki/Command-line_interface

    An MS-DOS command line, illustrating parsing into command and arguments. A command-line argument or parameter is an item of information provided to a program when it is started. [20] A program can have many command-line arguments that identify sources or destinations of information, or that alter the operation of the program.

  8. Disk First Aid - Wikipedia

    en.wikipedia.org/wiki/Disk_First_Aid

    Disk volume, Extent B-tree, Catalog B-tree, Catalog Hierarchy, Volume Info, and to search for locked volume name. [7] After analyzing the disk directory, Disk First Aid determines whether it is able to repair any damage that was detected. The utility can commonly only fix problems associated with the catalog/extents files and the volume bitmap. [4]

  9. Keychain (software) - Wikipedia

    en.wikipedia.org/wiki/Keychain_(software)

    On a shared Mac/non-Mac network, it is possible for the login keychain's password to lose synchronization if the user's login password is changed from a non-Mac system. Also, if the password is changed from a directory service like Active Directory or Open Directory, or if the password is changed from another admin account e.g. using the System ...