- Shut down your Mac, then press and hold the power button until "Loading startup options" appear.
- Select "Options"
- In the menu on top of the screen, choose "Utilities" -> "Startup Security Utility".
- Click "Security Policy"
- Select "Reduced Security" and check "Allow user management of kernel extensions from identified developers".
- Reboot
| sudo kill `ps -ax | grep 'coreaudiod' | grep 'sbin' |awk '{print $1}'` | |
| # or... | |
| sudo killall coreaudiod |
This work is released under a Creative Commons Attribution-NoDerivatives 4.0 International License.
"OpenPGP" refers to the OpenPGP protocol, in much the same way that HTML refers to the protocol that specifies how to write a web page. "GnuPG", "SequoiaPGP", "OpenPGP.js", and others are implementations of the OpenPGP protocol in the same way that Mozilla Firefox, Google Chromium, and Microsoft Edge refer to software packages that process HTML data.
- Shut down your Mac, then press and hold the power button until "Loading startup options" appear.
- Select "Options"
- In the menu on top of the screen, choose "Utilities" -> "Startup Security Utility".
- Click "Security Policy"
- Select "Reduced Security" and check "Allow user management of kernel extensions from identified developers".
- Reboot
Version number is reported by fsutil fsinfo refsinfo, available on Windows 10 and Windows Server 2016.
- Version of formatted by Windows Server 2012.
- Version 1.1 is used already in Windows Server 8 Beta. I have never seen version 1.0.
- Can use and store alternate data streams, when mount on 8.1/2012 R2 or later.
- Version of formatted by Windows 8.1, Windows 10 v1507 to v1607, Windows Server 2012 R2, and when specified ReFSv1 on Windows Server 2016 or later.
- Cannot use alternate data streams, when mount on 2012.
| iBoot version: iBoot-7429.40.68 | |
| Registering: IOService:/options/IODTNVRAMDiags | |
| Registering: IOService:/options/options-system | |
| Registering: IOService:/options/options-common | |
| Darwin Image4 Validator Version 5.0.0: Mon Sep 6 01:31:08 PDT 2021; root:AppleImage4-157.40.6.0.2~68/AppleImage4/RELEASE_ARM64E | |
| AppleImage4: failed to read nvram property: oblit-inprogress: 2 | |
| AMFI: UDID enforcement enabled | |
| Registering: IOService:/ | |
| Registering: IOService:/AppleARMPE/IOSystemStateNotification | |
| Registering: IOService:/AppleARMPE/IOPMrootDomain |
| DISKUTIL(8) BSD System Manager's Manual DISKUTIL(8) | |
| NNAAMMEE | |
| ddiisskkuuttiill -- modify, verify and repair local disks | |
| SSYYNNOOPPSSIISS | |
| ddiisskkuuttiill [qquuiieett] _v_e_r_b [_o_p_t_i_o_n_s] |
If you want to change things on the root drive of a Mac you will need to take some steps to disable the built in security of the system. Most of these steps are the same regardless if you are on Intel or Apple Silicon. If there is a difference it is noted.
Note that all of these things put a Mac into an unsupported and less secure state.
Make sure you either perform these steps in a VM or that you reset the protections after you are done poking around
(This list is not exahustive on the details of each. Check the links at the end for more info.)
You've just finished installing and configuring all those packages on your first machine. Now it's just a matter of cloning the hard drive into all the others and changing the hostname. Right?
Well, not so easy. If you wish to avoid conflicts on your network, backups and elsewhere, i.e. if you wanna end up with a unique fingerprint for each machine, you must go a few steps further.
Here follows a checklist to help you out. It's aimed at Debian and derivates (e.g. Ubuntu), though other distros won't be much different.
The old way: edit /etc/hostname and /etc/hosts