• Mac OS X,  Mass Deployment

    Disable App Nap in Mavericks

    Mavericks can power down apps when you they’re not in use. For most apps this isn’t a big deal; however, from time to time you may encounter an app that you don’t want to nap when you aren’t using it. To do so, lick on the app and then do a Get Info with the app highlighted. From here, youll see a checkbox for Prevent App Nap. Check that and the app won’t nap! This setting is kept in ~/Library/Preferences/com.apple.LaunchServices.plist. There is a LSAppNapIsDisabled array. If you create a key with the domain from the app (e.g. net.sourceforge.audacity) and add the signature then you will have disabled App Nap for the app programmatically…

  • Mac OS X,  Mass Deployment

    Create Mavericks Installation Media

    A bootable installer is one of the fastest ways to install Mavericks. Rather than copy the installer to a local drive you can run it right off a USB disk (or Thunderbolt if you dare). Such a little USB drive would be similar to the sticks that came with the older MacBook Air, when we were all still sitting around wondering how you would ever install the OS on a computer with no optical media or Ethernet otherwise. Luckily, Apple loves us. To make a bootable USB/flash drive of Mavericks like the one that used to come with the MacBook Air, first name the USB drive. I’ll use mavinstall for…

  • Mac OS X,  Mac OS X Server,  Mac Security,  Mass Deployment

    ARD 3.7

    Apple has released the client and server updates for Apple Remote Desktop. Both are now available on the App Store. For official information of the server update, see http://support.apple.com/kb/HT5896?viewlocale=en_US. New features include: Support for OS X Mavericks A shared clipboard which allows automatic copy and paste between local and remote computers Improved support for Mac systems with multiple displays or multiple IP addresses Enhanced multi-observe with gesture support for swiping between screens Output of remote UNIX commands is no longer truncated The client update documentation is at http://support.apple.com/kb/HT5896?viewlocale=en_US&locale=en_US.

  • Mac OS X,  Mac OS X Server,  Mac Security,  Mass Deployment

    OS X 10.9 Mavericks Gives nvram A Delete All Option

    A nifty little new option in OS X 10.9 Mavericks is the ability to delete all of the firmware variables you’ve created. This can get helpful if you’ve got a bunch of things that you’ve done to a system and want to remove them all. If you run nvkram followed by a -p option you’ll see all of the configured firmware variables: nvram -p If you run it with a -d you’ll delete the given variables that you define (e.g. boot-args): nvram -d boot-args But, if you run the -c you’ll wipe them all: nvram -c Enjoy!

  • Mac OS X Server,  Mass Deployment

    Cascade Software Update Servers in Mavericks Server

    The swupd.plist file used to daisy chain multiple servers so they act as a cascade of software update servers. The new path for the property list is /Library/Server/Software Update/Config/swupd.plist. Here, the metaIndexURL key is sill the location that points to an internal Software Update Server that the server you are editing should look to for updates. To set a server to look at another internal server for software updates, edit the metaIndexURL key in the /Library/Server/Software Update/Config/swupd.plist file to include the path to the new server. The path should always have /content/meta/mirror-config-1.plist after the FQDN of the host name. So if your internal software update server was called daneel.foundation.lan the…

  • Mac OS X,  Mac OS X Server,  Mac Security,  Mass Deployment

    Configure DHCP in Mavericks Server

    DHCP, or Dynamic Host Control Protocol, is the service used to hand out IP addresses and other network settings by network appliances and servers. The DHCP Server built into OS X Server 3, installed on Mavericks Server is easy-to-use and fast. It’s pretty transparent, just as DHCP services should be. To install the service, open the Server app and then click on the Show button beside Advanced in the server sidebar. Then click on DHCP. At the DHCP screen, you’ll see two tabs: Settings, used for managing the service and Clients, used to see leases in use by computers that obtain IP address information from the server. You’ll also see…

  • Mac OS X,  Mac OS X Server,  Mac Security,  Mass Deployment

    New statshares Option in the smbutil command For OS X 10.9 Mavericks

    I wrote about using the smbutil for DFS in Lion awhile back. I haven’t needed to write anything else as it hadn’t changed since. But in OS X 10.9 Mavericks, a new option for smbutil appears: statshares. The statshares option has an -m option to look at a mount path for showing the path to the mount (e.g. if the mount is called krypted this should be something like /Volumes/krypted): smbutil statshares -m /Volumes/krypted When run, you see a list of all the attributes OS X tracks for that mount path, including the name of the server, the user ID (octal), how SMB negotiated an authentication, what version of SMB…

  • Mac OS X,  Mac OS X Server,  Mac Security,  Mass Deployment

    No More Blessing Folder9 In OS X 10.9 Mavericks

    In OS X you’ve always had this weird shroud of the “Classic” environment. This type of environment was used to facilitate running things in the previous incarnation of Apple’s operating systems. Many of these have disappeared over the years. In Mavericks we see  yet another go away in a very small an almost noticeable binary, bless. While this command conjures fears of getting excommunicated by a Borgia for many, for those of us in the Apple community, the bless command is used to define a folder to mount to boot to. In 10.8 and below, there was an option to bless –folder9, used to define a OS 9/Classic system folder.…

  • Mac OS X,  Mac OS X Server,  Mac Security,  Mass Deployment

    Encrypt Mavericks and Mavericks Server

    Encrypting a volume in OS X Mavericks couldn’t be easier. In this article, we will look at three ways to encrypt OS X Mavericks volumes. The reason there are three ways is that booted volumes and non-booted volumes have different methods for enabling encryption. Encrypting Attached Storage For non-boot volumes, just control-click or right-click on them and then click on Encrypt “VOLUMENAME” where the name of the volume is in quotes. When prompted, provide an encryption password for the volume, verify that password and if you so choose, provide a hint. Once the encryption process has begun, the entry previously clicked on says Encrypting “VOLUMENAME” where the name of the…