archive-com.com » COM » T » TIDBITS.COM

Total: 405

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • FlippedBITS: Booting Your Mac from a Duplicate
    when your regular startup disk is still present and functional but you hook up your duplicate and boot from it temporarily Perhaps you re doing this to verify that the duplicate works in which case you may be running from the duplicate for only a few minutes or perhaps your startup disk is having problems and you want to run a disk repair utility while carrying on with your regular work Either way let me start by saying what isn t a problem in this scenario For one thing it doesn t matter if your startup disk is external Apart from speed differences your Mac should behave identically whether the startup disk is connected via an internal SATA port USB FireWire Thunderbolt or whatever So don t let that trouble you in the least For another thing it doesn t matter if data happens to sync with the cloud while you re booted from the duplicate For example if you use iCloud your calendars contacts bookmarks and so on will sync in the background You need not worry that the outdated data already on your duplicate will somehow overwrite what s in the cloud on the contrary the cloud has the master copy sometimes called the truth so it will bring the data on your duplicate disk up to date Similarly if you use Dropbox or another cloud based file storage service it will bring your disk up to date with the latest truth from the cloud and it s unnecessary for you to fret over that in the slightest You do need to fret if you use POP for email or if you have any rules or filters that file incoming email from IMAP or Exchange servers into local mailboxes That could get messy with the duplicate being changed in ways that can t easily be applied back to the original so if in doubt refrain from checking your email at all while booted from the duplicate You need not even worry about aliases usually When you create an alias to an item that s on your current boot drive that includes items in the Finder s sidebar and in your Login Items list Mac OS X creates relative links That means if you make a duplicate boot from the duplicate and open an alias the item that opens is the one on the duplicate not on the original disk And that s probably what you want That s not to say your Mac might not have a script a symbolic link you created in Terminal or some other pointer that references a file or folder by disk name and if it does you could accidentally open the wrong copy of a file or application or save data to the wrong disk If you re concerned and want to be absolutely sure which item you re opening navigate manually from the top level of your disk when booted from a duplicate However at least one significant thing is most likely different even though you may not notice it If your duplicate had the same name as your startup disk presumably the most common case something slightly weird can occasionally happen Mac OS X won t let two mounted volumes have exactly the same name In the Finder they may look like they have the same name but if you already have a volume called Macintosh HD mounted and then you mount a second one behind the scenes the second one gets a different working name in this case Macintosh HD 1 That s because many things that happen on your Mac depend on being able to locate a disk by name and if there were any ambiguity a file might get put in the wrong place Ordinarily this on the fly renaming just works but it s not foolproof What if during the time you have both Macintosh HD and Macintosh HD 1 mounted another user on your network connects to your Mac and copies a file to what is now Macintosh HD your duplicate You might not notice it and when you switch back to your usual startup disk the file would be missing Similar things can happen with file synchronization apps software downloads and other operations Furthermore sometimes Mac OS X gets confused and doesn t correctly update its behind the scenes list of volume names so you could for example encounter a situation in which Macintosh HD is a volume you mounted after Macintosh HD 1 On the other hand renaming your duplicate doesn t necessarily solve these problems If your normal startup disk is named Cindy but you ve booted temporarily from Kate you may avoid mismatched name issues right now but later if you have to start using Kate permanently apps and users that were still trying to save data to Cindy could get confused All in all I think you ll get the best results if your duplicate has the same name as the original disk but you should follow a few steps just ahead to avoid problems while running from the duplicate Meanwhile you may have to think about another subtle background process backups After all your backup software is probably configured to run automatically perhaps once an hour like Time Machine or continuously like CrashPlan Backups usually don t begin immediately when you boot your Mac but they could easily kick in within 10 or 15 minutes What if you re planning to run your Mac from the duplicate for longer than that but not permanently Should you let your backups proceed meaning they ll be backing up the duplicate or should you turn them off In general there s no harm and considerable benefit in letting backups run Your backup software should act as though your duplicate is your regular startup disk and keep copying files to its normal destination as though you had restarted normally That s probably what you want because if you create or modify a file while running from the duplicate it can then be backed up The problem is in fact with the opposite case what if you modify a file but it isn t backed up perhaps because the time for the next periodic backup run hasn t rolled around yet When you switch back to your regular startup disk the file won t be there or won t be current and it won t be in your backups either It will still be on your duplicate but only if you think to check there before you update your duplicate the next time doing so will probably delete the new file because it s not on your startup disk Taking all this into account here are my recommendations for what to do when you must boot from a duplicate for a short period of time If you can avoid creating modifying or downloading files do If you can t make sure they re synced to the cloud copied back to your regular startup disk backed up or otherwise made available to yourself when you return to your usual disk later Let regular versioned backups such as Time Machine and CrashPlan run normally But if per the last point you can t avoid creating files make sure your backup software has in fact backed them up before switching back to your customary disk Turn off any scheduled updates to your bootable duplicates The last thing you want is for your duplicate disk to clone itself back onto your main startup disk while you re testing it or for the software to freak out in trying to clone the original over the now booted duplicate Avoid letting other users connect to your Mac especially to upload files Booting a Different Mac There s one more scenario to consider booting one Mac with a duplicate of another Mac s startup disk For example imagine that you created a duplicate of your iMac s startup disk and then you had to take your iMac to the shop for repairs In the meantime you hook up your duplicate to your MacBook Pro so it can pretend to be the iMac As long as the MacBook Pro supports the same version of Mac OS X your iMac was running this arrangement should work fine with as you might have guessed a couple of qualifications First although this situation is ostensibly similar to the last one booting a Mac temporarily from another drive the time frame involved could be longer days or weeks instead of hours So it s impractical to avoid modifying files checking your email and the like Therefore I recommend that you use the duplicate disk on your MacBook Pro as you normally would use the internal drive on your iMac and then once your regular iMac is back in service hook up the external duplicate and reverse the cloning process copy everything from the external drive back to the iMac s internal drive it started on Second while your MacBook Pro is running from the duplicate it will by almost every measure appear to be the iMac It ll even use the iMac s name for file sharing screen sharing and the like However every Mac has several unique identifiers including a serial number a UUID universally unique identifier and a MAC media access control address for each network interface Some pieces of software check one or more of these unique identifiers to verify that they re still running on the same Mac on which they were authorized or licensed The most common example is iTunes If you authorize your iMac to use your iTunes account and then start up your MacBook Pro with a duplicate of the iMac s disk that doesn t mean the MacBook Pro is automatically authorized You must authorize it manually if you haven t done so previously in iTunes choose Store Authorize This Computer But if you ve already run out of authorizations Apple limits you to five you may be out of luck unless you can deauthorize one of your other computers or reset all your authorizations the latter being something that Apple allows you to do only once per year Other software may make you jump through similar or worse hoops Don t Sweat It As convoluted as this all may sound booting your Mac from a duplicate is usually a simple and problem free operation But it never hurts to have a better grip on what s going on behind the scenes just in case In particular think about whether you re going to be using the duplicate long enough to add or modify files on it manually If not there s no harm in simply switching back to the original But if you are going to be working from the duplicate for any significant period of time you ll need to clone it back to the original when you re done A final note keep those duplicates up to date It would be overkill to update them every hour but once or twice a day is not a bad idea Remember the longer the gap between the last time you updated your duplicate and when you discovered you needed to boot from it the greater the chance of missing or outdated files that you may have to laboriously restore Check out the Take Control ebooks that expand on the topic in this article Take Control of Backing Up Your Mac Joe Kissell provides the advice you need to create a Mac backup strategy that protects your data and enables quick recovery He compares backup software services and media to help you make the best choices You ll learn to set up test and maintain backups plus how to restore files after a calamity Don t miss our new Joe of Tech comic READERS LIKE YOU Support TidBITS by becoming a member today Check out the perks at http tidbits com member benefits html Special thanks to James Kane Michael Opitz Andrew Cohen and George Victor for their generous support Comments about FlippedBITS Booting Your Mac from a Duplicate Comments are closed rastarman 2013 03 13 15 47 Another thing to consider when booting from a clone is how you access items in the sidebar including and especially applications If an app on the normal internal boot drive is acting up and you boot from your clone to see if the app is ok there you must be sure to NOT use the sidebar or any similar shortcut to open the app You must go into the Appications folder on the clone and then open the app from there It s easy to forget After years of working wih clones I still sometimes do it Charles Prince 2013 03 14 00 13 As a novice user I don t think I understand Do items in the sidebar point to the applications on the internal boot drive Joe Kissell 2013 03 14 10 54 You ve both brought up an important point that I ll need to address in an updated version of the article The short version is this If you create an alias and that s essentially what you re doing with Sidebar items and Login items too to an item on the volume from which you have booted that alias is a relative location That is it says On the current startup volume whatever that happens to be follow this path to get to this file or folder However if you create an alias to something on another volume you get an absolute path On this particular volume name follow this path to get to this file or folder Usually this arrangement produces exactly the desired result when you boot from your duplicate your aliases point to things on the duplicate not on your original volume But there are some edge cases where it doesn t and the problem is that it s not always visually obvious where an alias s target is when you have two identical volumes mounted So if you want to be absolutely safe and certain you always navigate from the top of the desired volume to the item you want Because remember sometimes you may WANT to open something on the non boot volume although most of the time you won t jschenck 2013 03 13 19 24 Thanks Joe I didn t see anything I hadn t figured from my own mistakes but you put it all together in a concise readable article Glen McAllister 2013 03 14 07 04 Good stuff Joe think I ll update my bootable duplicate on a daily basis now B Jefferson Le Blanc 2013 03 18 19 06 There are issues as well with the frequency of backups If something goes wrong with your system and you update your cloned backup before you notice the issue the problem may be transferred to the backup This is particularly relevant if you don t do regular routine maintenance on your boot drive Problems with the original drive may even cause the backup to fail For this reason though it may seem like a hassle to do so you should at a minimum in my opinion use Disk Utility to repair permissions and validate your hard drive before you update your clone I also run those routines on my backup drive before updating the clone However these procedures are impractical if you back up twice or even once a day For this reason I use SuperDuper to maintain my clones and Time Machine for more frequent backups This way I can update my clones less often say once a week and still be sure I have access to all my files should something go wrong in the meantime The reverse case arises for those who don t back up before making important modifications to their system like major software and system updates If your system is not in the best possible shape an update can fail and even put your system out of commission Without a recent backup you re SOL In this case a clone is more practical than Time Machine because as is the theme of this article you can boot from the backup immediately and get back to work Restoring from a Time Machine backup when your boot drive is hosed is time consuming and I ve found not always reliable Reinstalling over the network will put you even more behind the eight ball In addition if you cannot use your system because the drive itself has failed you won t be able to access the Recovery HD partition either which will mean even more work before you can return to work or play While a cloned backup won t include the Recovery HD partition it will keep you going while you either reformat and reinstall OS X on your original drive or replace the drive Another way around the clone frequency issue would be to use one backup drive for daily updates and another drive to update once a week or so which would likely be the case if you follow Joe s advice to keep a copy of your boot drive off site You re not going to update an off site drive twice a day I will add my two cents here that while cloud backups may be convenient in some ways they may be no more reliable than your own in house backups Cloud backups are after all done on someone else s computer one likely to be even more heavily used than your own Cloud providers not infrequently suffer service outages and hardware failures as well And restoring from the cloud even if it s possible will be agonizingly slow And who can afford to pay for the volume of cloud storage that would be required to back up an entire system Cloud storage may be great for collaboration or those who use more than one computer but for

    Original URL path: http://tidbits.com/article/13618 (2016-04-24)
    Open archived version from archive

  • Introducing Our New FlippedBITS Column
    perhaps unconsciously start trying to construct a mental model of what must be happening behind the scenes These models not only help us explain what we re seeing they help us predict how things will work in the future It s just that sometimes through no fault of our own we guess wrong For example I remember the first time I heard of this newfangled device called a laser printer I was a freshman in college I got that paper went in blank and that due to something involving a laser it came out with crisp black text But the initial idea I had about how this worked was that the laser was somehow burning the letters directly on the paper because after all burning is what lasers do Later when I found out that laser printers used a black powder called toner I had to revise my theory Maybe the paper was covered with toner before the laser zapped it and the heat from the laser caused the toner to melt in spots and stick to the paper That turned out to be wildly wrong too of course I had no idea at the time that a laser beam could reverse an electrostatic charge that otherwise causes toner to stick to a drum that when paper rolled along that drum it picked up the remaining toner again due to electrostatic attraction and that a combination of heat and pressure then fused the toner to the paper My theories had seemed reasonable based on the available information they even correctly predicted that the paper would come out of the printer warm But my mental model didn t happen to reflect reality Misconstruing how a laser printer worked had no negative consequences for me But sometimes erroneous mental models lead to serious problems If your mental model of how a car s air bags work is that they offer complete protection in any sort of crash that could lead you not to bother wearing a seatbelt which might prove deadly if for example your car flipped over I get lots of technical questions from people who have read my books and articles or heard me speak somewhere A fair percentage of the time the questions are phrased in a way that shows they come from a mistaken mental model For example in the last several weeks at least three different people have asked approximately the same question Since FileVault encrypts all the files on my disk doesn t that mean when I copy a file to another disk it s still encrypted No It absolutely does not mean that I ll explain why in a future FlippedBITS article But I can easily see how someone might draw such a conclusion and misunderstanding something like that could cause someone to make an unsafe decision about how to handle sensitive files I ll admit it When I hear questions like this I sometimes have to fight the temptation to roll my eyes and

    Original URL path: http://tidbits.com/article/13617 (2016-04-24)
    Open archived version from archive

  • iPhone iPad iPod
    7 inch iPad Pro Free 239 MB by Josh Centers 21 Mar 2016 2 comments Apple Shrinks iPhone and iPad for Latest Releases Apple has introduced two small literally mid cycle updates the 4 inch iPhone SE and the 9 7 inch iPad Pro by Josh Centers 21 Mar 2016 9 comments AceDeceiver First iOS Trojan Exploits Apple s FairPlay DRM Security firm Palo Alto Networks has discovered a new family of iOS malware that can infect non jailbroken devices Called AceDeceiver this is not something for most Mac users with iOS devices to worry about now since the exploit relies on a separately infected Windows machine and it displayed malicious behavior only when the user was located in China The attack vector is novel in that it relies on flaws in Apple s FairPlay digital rights management code and malware that masquerades as iTunes to install apps without the user s knowledge Although Apple s code review failed to catch the malware initially the company has now removed AceDeceiver from the App Store 21 Mar 2016 0 comments Comment on this link Game Center Still Broken after Six Months of iOS 9 Writer Craig Grannell points out how Game Center has been broken since the release of iOS 9 That might seem minor since Game Center isn t an especially popular app but many multiplayer turn based games depend on Game Center to function so many of them now work inconsistently Unfortunately this is more evidence of the decline in Apple s software quality 17 Mar 2016 1 comment Comment on this link Apple Issues New iOS 9 2 1 to Fix Error 53 Apple has issued a quiet update to iOS 9 2 1 to resolve Error 53 which made iOS devices repaired by outside parties unusable Here s what to do if your iPhone is affected by Josh Centers 18 Feb 2016 Listen 1 comment Fujitsu ScanSnap Scanners Save your business time and money with our easy to use small ScanSnap Scanner line Eliminate paper piles by scanning documents business cards and receipts Visit us at http budurl me sstb Apple Stores Installing Belkin iPhone Screen Protectors Although iPhone screens are generally quite durable particularly if guarded by a case some people like to add a screen protector too But installing a screen protector can be a finicky and error prone process that suffers from problems with alignment air bubbles and trapped dust Apple and Belkin are trying to address these frustrations in Apple retail stores where Apple employees will install screen protectors using Belkin s proprietary ScreenCare Application System a machine designed to perform perfect installations The system works with the iPhone 6 6 Plus 6s and 6s Plus and offers two screen protector options InvisiGlass and Anti Glare 09 Feb 2016 Facebook s iOS App Is Still a Battery Hog Despite Facebook supposedly taking steps to address the issue the service s iOS app apparently still consumes more battery power than is reasonable Samuel Gibbs

    Original URL path: http://tidbits.com/index.cgi?tbcat=17 (2016-04-24)
    Open archived version from archive

  • TidBITS Apple Releases iOS 9.3.1 to Address Link Bug
    of users had complained about similar problems in iOS 9 2 1 it will be interesting to see if this update addresses their complaints as well image link 2 To download the small update 27 5 MB on my iPhone 6 go to Settings General Software Update or update via iTunes I haven t noticed any problems with this update so far but it did seem to take an unusually

    Original URL path: http://tidbits.com/article/16380?print_version=1 (2016-04-24)
    Open archived version from archive

  • TidBITS Chapter 5 of “Take Control of Slack Basics” Available
    use a snippet They re a great way to compress a bunch of text into a small space in the message list and then let readers expand it If you want to collaborate with others on a chunk of text use a post Team members can comment on it or if you let them take turns editing it When typing back and forth just isn t enough you can make voice calls from within Slack As always if you want to try out attachments snippets posts and calls well with people you already know in the team join our public SlackBITS group which has nearly 150 members and so far has hosted discussions of Slack the Mac iOS and Apple TV along with a channel devoted to collecting links to fun April Fools jokes including our piece Apple Developing Fortieth Anniversary Mac 3 1 April 2016 You re welcome to ask anything you like in SlackBITS and we ll do our best to answer Instructions on how to join are in Chapter 1 Introducing Slack 4 Also available to everyone is Chapter 2 Get Started with Slack However Chapter 3 Master the Interface 5 Chapter 4 Post Basic Messages 6 and this new Chapter 5 are accessible only by TidBITS members so if you re not currently one we hope this is incentive to join 7 TidBITS members receive other benefits too but what s most important is that the TidBITS membership program has kept TidBITS afloat the last few years your support is essential If you re already a TidBITS member log in to the TidBITS site using the email address from which you joined to read and comment on these chapters The full ebook of Take Control of Slack Basics will be available for purchase by everyone in

    Original URL path: http://tidbits.com/article/16384?print_version=1 (2016-04-24)
    Open archived version from archive

  • TidBITS Google Gives Away Its Nik Collection Photo-editing Apps
    now anyone can use it Mac and iOS users should probably not wait for the collection to spawn Apple Photos extensions 13 any time soon Google s Nik Software buyout has been a mixed blessing for photography enthusiasts in recent years The acquisition included Snapseed 14 picture editing apps for iOS 15 and Mac But in 2013 Google killed 16 the Mac version along with a PC version even though Nik had announced 17 the product only about a year earlier just before being acquired Google has said it will continue upgrading its Snapseed iOS app a universal app with full iPad compatibility along with an Android version though Google also used the Nik technology to turbocharge 18 the photo editing controls that were a part of its Google social network But those advanced tools later vanished 19 replaced with far simpler ones when Google Photos transformed into the standalone Google Photos 20 service In a semi related development Google in February 2016 announced that it s shutting down 21 its Mac and PC based Picasa photo organizing apps which it acquired when it bought out Picasa Inc 22 in 2004 It now appears that Google is focusing on the Google Photos service with frequent updates to the service s mobile apps and Web app Just last week it unveiled a smart album 23 feature along with interface tweaks Google Photos also now supports Apple s Live Photos 24 feature Unfortunately the Nik Collection is entirely disconnected from Google Photos and Snapseed making it awkward for Google fans wanting to use all of the above Still free is free and there s no reason not to get the app suite while it s there for the taking and it might not be in the future if indeed Google has no further plans to upgrade this product But casual photo editing buffs beware the Nik Collection is not entry level stuff like Google Photos and Apple s Photos The Nik apps have daunting interfaces and steep learning curves For the average user the suite may be overkill image link 25 Nor is the Nik Collection a single integrated product meaning that you have to open and close these tools sequentially if you are doing heavy surgery on an image This is true regardless of whether the tools are being used in a standalone capacity or as Lightroom and Photoshop plug ins And the suite s total lack of integration with Apple Photos may be a deal breaker for many Mac based picture enthusiasts But for those who like experimenting with a wide range of editing tools on their Macs the Nik Collection is now an amazing bargain 1 https plus google com NikCollection posts AFGsG2Di7EK 2 https www google com nikcollection 3 https plus google com VicGundotra posts 2YWhK1K3FA5 4 https www google com nikcollection products analog efex pro 5 https www google com nikcollection products color efex pro 6 https www google com nikcollection products silver efex pro 7 https

    Original URL path: http://tidbits.com/article/16376?print_version=1 (2016-04-24)
    Open archived version from archive

  • Safe Computing
    line of Arris formerly Motorola SURFboard cable modems The exploit allows remote attackers to reset the modems knocking victims offline for up to 30 minutes it s a denial of service attack not one that exposes personal information The problem could be fixed with a firmware update but unfortunately there s no mechanism that enables users to update their cable modems Updates must be pushed out by Internet service providers many of whom update only leased modems not those owned by customers If you have one of these modems talk to your ISP about an update 08 Apr 2016 16 comments Comment on this link FBI s iPhone Hack Limited to Older iPhone Models While the FBI has successfully cracked the iPhone 5c you can breathe a sigh of relief if you own an iOS device with Touch ID Speaking at Kenyon College in Ohio FBI Director James Comey said We have a tool that works on a narrow slice of iPhones The world has moved onto the iPhone 6s and this doesn t work on 6s or on iPhone 5Ss The Guardian speculates that this is due to the Secure Enclave baked into Touch ID devices which acts as a lockbox for sensitive information 07 Apr 2016 0 comments Comment on this link 1Password 6 2 1 Under the hood improvements to make filling in forms more accurate 49 99 new free update 44 4 MB by Agen G N Schmitz 05 Apr 2016 0 comments FBI to Unlock iPhone in an Arkansas Homicide Case Apparently it wasn t just about one iPhone Despite the government s protestations that it wasn t seeking a backdoor when asking Apple to unlock the iPhone in the San Bernardino terrorism case the Associated Press is reporting that the FBI has now agreed to help an Arkansas prosecutor unlock an iPhone and iPod associated with a double homicide It remains to be seen if the FBI will share its knowledge of how the unlocking is being achieved with Apple but it s conceivable that the hack works only on older iPhones or models running a particular version of iOS At that point the FBI could both share the information with Apple and still use the technique on iPhones currently in the possession of law enforcement when possible 31 Mar 2016 1 comment Comment on this link Restricting Your Cell Carrier s Use of Your CPNI Data Adam Engst explains those inscrutable email messages from AT T about CPNI and suggests that opting out would be sensible For those using Verizon Wireless or Sprint similar options are available by Adam C Engst 25 Mar 2016 Listen 6 comments READERS LIKE YOU Support TidBITS by becoming a member today Check out the perks at http tidbits com member benefits html Special thanks to Brian Webster Scott McNally Pete Lindsay and Rhoden Streeter for their generous support FlippedBITS 1Password Versus iCloud Keychain Recent versions of OS X and iOS have a built in password manager called

    Original URL path: http://tidbits.com/index.cgi?tbcat=13 (2016-04-24)
    Open archived version from archive

  • TidBITS Make Sure You’re Getting OS X Security Data
    that the next three checkboxes are related but that s where Apple messed up The next two Install app updates and Install OS X updates sound like Install system data files and security updates but they work differently When selected those first two checkboxes tell the App Store app to install app and OS X updates automatically if you leave them deselected you re instead notified of updates and given the opportunity install to them manually at a convenient time In contrast if you fail to select Install system data files and security updates you won t be notified of these critical background security related updates These are not the same as Apple s foreground updates with names like Security Update 2016 002 they fall into the OS X updates category So what are they TidBITS Talk member Al Varnell who works in the security community shared what he knows in the discussions there but warns that the information is incomplete because Apple has avoided documenting these systems due to the security implications These critical background updates include at least the following Core Suggestions Configuration Data CoreLSKD Configuration Data Gatekeeper Configuration Data Incompatible Kernel Extension Configuration Data MRT Configuration Data XProtectPlistConfigData I assume some of these files contain information used by security processes as outlined in this Apple support article 3 Gatekeeper enables OS X to avoid opening applications that aren t signed MRT likely stands for Malware Removal Tool since it appeared around the time of the MacDefender malware see Apple Responds to Increasingly Serious MacDefender Situation 4 25 May 2011 Apple s Security Update 2011 003 5 could detect and remove MacDefender And XProtect is part of OS X s File Quarantine feature which scans downloaded files for malware and blocks Web plug ins with known vulnerabilities like Flash and Java Incompatible Kernel Extension Configuration Data helps OS X disable old kernel extensions that may cause crashes but it s unclear what Core Suggestions Configuration Data and CoreLSKD Configuration Data contain You might also see Chinese Word List Update I presume that s not security related Apple needs to push out updates to these files based on new threats if Apple s engineers become aware of a new piece of malware OS X s security systems need to know about it as soon as possible to protect Mac users around the world Disabling the Install system data files and security updates checkbox is frankly a terrible idea it s not installing code and barring a mistake like Apple made in accidentally adding the Ethernet kernel extension to the Incompatible Kernel Extension Configuration Data file it s unlikely that allowing this security related data to be updated could cause many problems So if you ve deselected Install system data files and security updates turn it back on and wait a day or two for Software Update to notice and update everything image link 6 If you don t want to wait select that checkbox and then issue this command

    Original URL path: http://tidbits.com/article/16377?print_version=1 (2016-04-24)
    Open archived version from archive



  •