Ever been hacked? Had information stolen? Who do you turn to? What do you do? No matter what the level, a security breech has occurred and action must be taken to ensure a repeat offense doesn’t happen. The first reaction to a security breech is to isolate it and fix it as soon as possible. However, writing to the systems in any way can cause clues to be overwritten. Therefore it is important to discover the identity of the attacker. The more quickly that forensic analysis is performed the more likely that the attacker, vandal or thief will be apprehended. One of the best places to start in analysis is…
-
-
Link Aggregation and Tiger
I originally posted this at http://www.318.com/TechJournal Mac OS X 10.4 includes support for link aggregate networking. Link aggregate networking shares network traffic over two or more bonded Ethernet controllers, giving them one IP address for communication. This can allow the servers controllers to run at speeds of 2Gbps. Link aggregation is configured using the Network System Preference Pane. To enable Link Aggregate Networking 1. Open the Network Pane from System Preferences 2. Click the Show: box and select Network Port Configurations 3. Click New 4. In the Name: box enter a name for the new aggregate port 5. In the Port: box select Link Aggregate 6. Places check marks in…
-
Password Encryption
I originally posted this at http://www.318.com/TechJournal Logging onto most network resources requires the use of a password. Before passwords are sent over networks they are encrypted. Many different variables and algorithms are used to encrypt passwords. The most common method of encrypting passwords before they are sent over a network uses the seconds and minutes fields of file modification time stamps to build variables. The system doesn’t use the time stamp as a variable directly, but uses them to generate hashes. A hash is a number generated from a string of text. The hash is smaller than the text itself and is generated by a formula in such a way…
-
Mac OS X and Terminal Services
You can download Remote Desktop Connection for the Mac at http://www.microsoft.com/mac
-
Apple's Market Share
Originally posted at http://www.318.com/TechJournal According to a report by JupiterMedia Corp, Mac OS X is becoming more and more of a standard in the small to Enterprise business categories. The report states that in organizations with 10,000 or more employees, 21% use Mac OS X on their desktops in the office. In businesses with 250 employees or more, 17% of the employees run Mac OS X on their desktop computers at work. Mac OS X is taking market share aware from traditional Linux and Unix installations. One explanation for this is that Mac OS X is easier to use than Linux and Unix, especially for desktop computers. Another explanation is…
-
logname and whomai
You can determine the name of a user who is logged in using a number of different methods. From the command line there are two commands that most commonly get used for this: logname and whoami. Each can be used without any arguments to return the name of the user running the command, a great way to debug scripts, or grab the name of a user. To use logname: logname To use whoami: whoami
-
Reset the Admin or Root Password in Mac OS X
Forgot the admin password in Mac OS X? Well, Apple let’s you boot computers into what is known as Single User Mode. To boot a Mac into Single User Mode, boot the machine holding down Command-S. Once the system boots up, you should see a command prompt. Here, run fsck: fsck -fy Then mount the file system: mount -uw / Then reset the password using the passed command passwd <username> For example, if the user is root: passwd root When prompted, provide the desired administrative password.
-
High Availability in Mac OS X
AFP548 did a great little article on high availability in Mac OS X environments: http://www.afp548.com/article.php?story=20041202093128481
-
Directory Listing with Permissions
To list the files in a directory with the permissions for files, use the following command (assuming you’re in the working directory you would like to list files for: ls -al
-
vnode
The vnode table represents all file activity in UNIX. There is a unique vnode allocated in the vnode table for each active file, each current directory, each mounted-on file, text file, and the root. To see the number of vnodes available in Mac OS X, look to sysctl for the kern.maxvnodes variable using something similar to the following command: sysctl -A | grep vnode