dupeGuru is a cross-platform (Linux, OS X, Windows) GUI tool to find duplicate files in a system. Itâs written mostly in Python 3 and has the peculiarity of using multiple GUI toolkits, all using the same core Python code. On OS X, the UI layer is written in Objective-C and uses Cocoa. On Linux & Windows, itâs written in Python and uses Qt5. dupeGuru is a tool to find duplicate files on your compu
tag - A tool for manipulating and querying file tags. usage: tag -a | --add <tags> <path>... Add tags to file tag -r | --remove <tags> <path>... Remove tags from file tag -s | --set <tags> <path>... Set tags on file tag -m | --match <tags> <path>... Display files with matching tags tag -f | --find <tags> <path>... Find all files with tags, limited to paths if present tag -l | --list <path>... List
ãã®è¨äºã¯ KainokiKaede Advent Calendar 2014 17æ¥ç®ã®è¨äºã§ãï¼å¤§åï¼ Mac 㧠PDF ãé²è¦§ããã¨ãã¯æ¨æºã® Preview.app ãç¨ããã¨ä¾¿å©ã§ãããããã Preview.app ã«ã¯å³ç¶´ãã®æ¬ã表示ããæ©è½ãã¤ãã¦ããªããæ¥æ¬èªä»¥å¤ã«ãå³ç¶´ããå¿ è¦ã¨ããè¨èªã¯ããã¨æãã®ã ããApple ã®ããã¤ã¹ã¯ãã®ãããªå½ã§ã¯æ®åãã¦ããªãã®ã ãããï¼ ã¨ã«ãããã«ã Preview.app ã§ã¯ä¸å¯è½ãªã®ã§ãå¥ã®ã½ãããç¨ãããã¨ã«ãªããComicViewer for Mac ã¨ããã½ããããããããµãã¼ããã©ã¼ã©ã ãè¦ããããéçºãåæ¢ãã¦ä¹ ããã ãããã« PDF ã®å¤§å ã§ãã Adobe 御大ãªãã°ãããã㪠PDF ã®è¡¨ç¤ºãå¯è½ã§ãããã¨æ¨å¯ããAdobe Reader ããã¦ã³ãã¼ã ãããæå㯠Retina ãã£ã¹ãã¬ã¤ã«å¯¾å¿ãã¦
WebDAVNav Server is a free basic WebDAV server which can be used to quickly share files and folders from your Mac with other computers, mobile devices and apps, including WebDAV Navigator. Available in the Mac App Store. Features include: Quick setup, select the folder to share and click the Start buttonDownload, Upload, Rename, Copy and Move files in your selected folderIncludes the ability to se
Linux/OSSé¢é£ã®ã¨ã³ã¸ãã¢ã§ããOSSç£è¦ãã¼ã«Zabbixã®æ¥æ¬æ¯ç¤¾ãZabbix Japanã®ä»£è¡¨ãåãã¦ãã¾ãã FATã§ãã©ã¼ããããã¦ããå¤ä»ããã£ã¹ã¯ããMac OS Xã«ãã¡ã¤ã«ãã³ãã¼ããã¨ããã¼ããã·ã§ã³ã777ã«ãªã£ã¦ãã¾ãæ°æã¡ãæªããã¨ã«ãªãã¾ãã ã¿ã¼ããã«ãããã¡ã¤ã«åã«ç©ºç½ãå«ããã¡ã¤ã«ãfindã¨xargsã§å¦çãããã¨ãã¦ãããã¡ã¤ã«åã«ç©ºç½ããããã以ä¸ã®ãããªã¨ã©ã¼ãåºã¦ãã¾ãå¦çã§ãã¾ããã xargs: unterminated quote 以ä¸ã®ããã«ããã®ãæ£è§£ãããã§ãã find -type f -print0 |xargs -0 chmod 644
I'm running a Parallels 11 VM from a USB 3.0 flash drive. I currently just leave it plugged in the back of my iMac. However, I have noticed that whenever I boot the iMac, the USB drive does not automatically mount, and I'll either have to unplug it or mount it manually in Disk Utility. It's not a huge problem, but it is slightly annoying - I know, HUGE first world problem. Is there a way to fix th
ä»ãããèµ·æ¥å®¶ã®ã¤ã³ã¿ãã¥ã¼æ åãç·¨éãã¦ããã®ã§ããã ãã®ã¤ã³ã¿ãã¥ã¼ãã¨ã«ããé·ãï¼ç¬ é³å£°ã¯æèã®æµããææ¡ã§ãã¾ãããå 容ã俯ç°ãããã¨ã¯ã§ãã¾ããã å 容ãä¸åº¦ã«ææ¡ããã®ã«é©ããã¡ãã£ã¢ã¯ãæç« ãã§ãã ãã®ãããé³å£°ãæåèµ·ãããããã¨ã«ãã¾ããã åãç¾å¨ä½¿ã£ã¦ããæ åç·¨éã½ããAdobe Premiereã«ã¯ã 2014å¹´çã¾ã§ãã¹ãã¼ã解æãã¨ããæ©è½ãããã¾ããã é³å£°ãèªåçã«æåèµ·ãããã¦ãããæ©è½ã§ãã ããããã¦ã¼ã¶ã¼ããã®è©å¤ãæªãã2015å¹´çã§åé¤ãããããã§ãã Adobe Premiere Pro ãã«ã | ã¹ãã¼ãåæ Premiereã®ã¹ãã¼ã解æã使ç¨ããããã«ã¯ã æ§ããã¼ã¸ã§ã³ãã¤ã³ã¹ãã¼ã«ããªããã°ããã¾ãããã ææ°ãã¼ã¸ã§ã³ã¨åå± ãããã¨ä¸å ·åãèµ·ãããã§å«ãªæãã§ãã Adobe製åã®ã¤ã³ã¹ãã¼ã«ã«ã¯ããã¾ã§ä½ãã¨æ³£ãããã¦ãã
System Integrity Protection (SIP,[1] sometimes referred to as rootless[2][3]) is a security feature of Apple's macOS operating system introduced in OS X El Capitan (2015) (OS X 10.11). It comprises a number of mechanisms that are enforced by the kernel. A centerpiece is the protection of system-owned files and directories against modifications by processes without a specific "entitlement", even wh
El Capitan & Homebrew Part of the OS X 10.11/El Capitan changes is something called System Integrity Protection or "SIP". SIP prevents you from writing to many system directories such as /usr, /System & /bin, regardless of whether or not you are root. The Apple keynote is here if you'd like to learn more. One of the implications of SIP is that you cannot simply create /usr/local if it is removed o
OS X Server is in maintenance mode. That much was clear when Mavericks Server came out a year ago with just a handful of welcome-but-minor tweaks and improvements. The software hasnât grown stagnant, reallyâcertainly not to the extent of something like Apple Remote Desktop, which only gets updated when itâs time to support a new OS X version. But now OS X Server is changing very little from versio
<< back ãã¡ã¢ãªã ãPC3-12800ã ã8GBx2ã ãPC3-12800ã ã4GBx2ã ãã¡ã¢ãªã ãPC3-10600ã ã8GBx2ã ãã¡ã¢ãªã ãPC3-10600ã ã4GBx2ã 2011.08.09 / Tue Mac miniï¼Mid 2011ï¼ã®ã³ãã¯ã¿ãä¿®çãã ãMac mini Server / Mid 2011ï¼MC936J/Aï¼ãã®ãä¸æ®µï¼åºé¢å´ï¼ã®ãã¼ããã£ã¹ã¯ããåãåºãä½æ¥ä¸ã«ãã³ãã¯ã¿ãç ´å£ãã¦ãã¾ãã¾ããã ãã®ä¿®çã®æ§åã説æãã¾ãã ãMac mini / Mid 2011ãã®ãä¸æ®µï¼åºé¢å´ï¼ã®ãã¼ããã£ã¹ã¯ããåãåºãã«ã¯ããã¸ãã¯ãã¼ããå®å ¨ã«å¼ãåºããªãã¨ããã¾ããã ï¼ç»å âï¼ãã¸ãã¯ãã¼ãã«ã¯ããé»æºã®ã±ã¼ãã«ï¼å³ï¼ãã¨ã赤å¤ç·ã»ã³ãµã¼ã®ã±ã¼ãã«ï¼å·¦ï¼ããç¹ãã£ã¦ãã¾ãã ï¼ç»å âï¼ã±ã¼ãã«ãç¹ãã£ã¦ããã®ã確èªã
ï¼SIDE STORYï¼ 1980年代ãå¡å·¥å±ç¨¼æ¥ãã¨ã³ã¸ãã¢ããªãã社å ã§èªå·±å¦ç¿ã«å±ãã ãã¤ã³ã³ã»ãã½ã³ã³ã®ããã°ã©ãã³ã°ãããã¦ã¢ããã«ããçºå£²ããã3.5ã¤ã³ãããããã¼ãã£ã¹ã¯ã»ãã©ã¤ãæè¼ã®ãã½ã³ã³ï¼Macintoshããã£ã¦ããã¨ãã¸ãã³ã®å¥½å¥å¿ã¯ä¸æ°ã«å éããã®ã§ããã ããã¦1985å¹´ãããããã¼ãã£ã¹ã¯ã¯ã½ãã¼è¦æ ¼ã®3.5ã¤ã³ããæ¾ä¸/æ¥ç«è¦æ ¼ã®3ã¤ã³ãã«åããã¦æ¬¡ä¸ä»£ã»æ®ååã®è¦æ ¼ãäºãããã«ãªãã¾ãããããããã©ããªããã ãï¼ãã¨ãããã¨ã§3.5ã¤ã³ãFDDãæè¼ãããã½ã³ã³ï¼Maintosh128K ã¨SONY SMX777ï¼ã調æ»ç¨ã«è²·ãè¾¼ããã¨ã«ãªãè·å ´ã«Macããã£ã¦ãã¾ããã大å¦æ代ãå²ã¨äºç®ãè±å¯ãªç 究室ãå¤ããNECã®PC-8000ãPC-9800ãã·ã£ã¼ãã®MZç³»ãå¯å£«éã®FM-7ãç½®ããã¦ãé»ç®æ©ãã¨ãã¦è§¦ã£ã¦ãã¾ããããMacintoshã¯ç®ãè¦
æ¦è¦ 表é¡ã®rootpipeã®è©³ç´°ã¨Exploitãå ¬éããã¾ããã https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/ OSX 10.10.2以åã§ãä»»æã®ãã¡ã¤ã«ãrootã®ææã«ã§ãã + setuidãã¤ããã = root権éã§ããæ¾é¡ãã¨ããèå¼±æ§ã§ãããã®èå¼±æ§ã¯OSX 10.10.3ï¼Yosemiteææ°ï¼ã«ã¦ä¿®æ£ããã¾ãããã10.9ï¼Mavericksï¼ä»¥åã®ãã¼ã¸ã§ã³ã«ã¯ä¿®æ£äºå®ããªãããã§ãã å®æ¼ ä¸è¨ãµã¤ãã®Exploitãrootpipe.pyã¨ãã¦ä¿åãã¾ãã ######################################################## # # PoC exploit code f
TL;DR The Admin framework in Apple OS X contains a hidden backdoor API to root privileges. Itâs been there for several years (at least since 2011), I found it in October 2014 and it can be exploited to escalate privileges to root from any user account in the system. The intention was probably to serve the âSystem Preferencesâ app and systemsetup (command-line tool), but any user process can use th
話ã話ãã ãã«èå¼±æ§ã®æ¤è¨¼ãåºæ¥ã¾ããããTLDRã ãèªãã¨ãOS Xã®Admin frameworkã«ã¯ï¼ç®¡çè ããã¹ã¯ã¼ãç¡ãã«ï¼rootã¸ãªããé ããããã¯ã㢠APIãããããã®ããã¯ãã¢ã¯æ°å¹´åããï¼å°ãªãã¨ã2011å¹´ããï¼åå¨ããç§ã¯2014å¹´ã®10æã«ãããçºè¦ããããã使ç¨ããã°ã·ã¹ãã ä¸ã®ä»»æã®ã¦ã¼ã¶ã¼ãrootã¸ææ ¼ãããã¨ãå¯è½ã§ãããã®APIã®ç®çã¯ã·ã¹ãã ç°å¢è¨å®ã¢ããªã¨ã³ãã³ãã©ã¤ã³ãã¼ã«ã®âsystemsetupâã®çºã«ã ã¨æããã¾ãããä»»æã®ã¦ã¼ã¶ã¼ããã»ã¹ãåãæ©è½ã使ãã¦ãã¾ãã¾ããã¨ã³ã¡ã³ããã¦ããã TL;DR The Admin framework in Apple OS X contains a hidden backdoor API to root privileges. Itâs been there for several years (
I have installed the JDK on Mac OS X v10.8 (Mountain Lion). When I upgraded it to Mac OS X v10.9 (Mavericks) and ran java -version in the terminal, it showed: No Java runtime present, requesting install. Then I manually installed the JDK (1.7) on my Mac. It seems that the installation worked fine. When the installation was done, I opened the terminal and typed java -version as well. It also showed
Windowsã¦ã¼ã¶ã¼ã ã£ã女åç·¨éè ããå®éã«Macã使ããªãã§åºåã£ããã©ãã«ã解決ããæ¬é£è¼ãMacã®ããã¬ãã¥ã¼ãã®PDFæ¸ãè¾¼ã¿ãåå²ã»çµåã¯ã¨ã¦ã便å©ãä½ããã®ã½ãããå¿ è¦ã ã£ãWindowsã¦ã¼ã¶ã¼ããããã¨ãããã ãã§ãã¡ãã£ã¨è奮ããã¬ãã«ã§ããã§ããããã¼ã¸æ°ãå¤ãã¨å¤§å¤ãOS Xã«æ¨æºæè¼ã®ãAutomatorããªãã¯ã³ãã¿ã³ã§PDFã®ãã¼ã¸ãã§ãã¾ãã ç§ããã®ããã«å¤§éã®PDFããã£ã¤ãããã®ã¯ãèªå® ã§ScanSnap iX500ãæç¨ãã¦ãããããèªåç´éï¼ADFï¼ä»ããªã®ã§ãA4ãµã¤ãºã¾ã§ã®ç´ãªãã©ãã©ãå¸ãè¾¼ãã§é«éèªã¿åããã¦ãããã®ã§ãããä»äºæéèªã®æ ¡æ£ç´ï¼ã²ã©ï¼ãªã©ãèªã¿åããããã¨ãå¤ãã§ãããããåºæ¬B4ãµã¤ãºãªãã§ããããããããã¨ãã¯ãªã¢ãã¡ã¤ã«ç¶ã®ãA3ãã£ãªã¢ã·ã¼ããã«æããã¨ã§ã¹ãã£ã³ã§ããããã§ããã1æãã¤åãã®ã§ãã¡ã¤ã«ããã©ãã©
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}