Skip to content

Instantly share code, notes, and snippets.

View applch's full-sized avatar
😀
OK

diff apple applch

😀
OK
View GitHub Profile
@applch
applch / UnixBenchmark macOS 10.13.2 (Build 17C205)
Created January 23, 2018 11:03
macOS 10.13.2 (Build 17C205) Post-Meltdown Patch UnixBenchmark
BYTE UNIX Benchmarks (Version 5.1.3)
System: hai10132noMacBook-puro.local: Darwin
OS: Darwin -- 17.3.0 -- Darwin Kernel Version 17.3.0: Thu Nov 9 18:09:22 PST 2017; root:xnu-4570.31.3~1/RELEASE_X86_64
Machine: x86_64 (unknown)
Language: en_US.utf8 (charmap="US-ASCII", collate=)
CPU 0: Intel(R) Core(TM) i5-5257U CPU @ 2.70GHz (0.0 bogomips)
MMX, Physical Address Ext, SYSENTER/SYSEXIT, Intel virtualization
CPU 1: Intel(R) Core(TM) i5-5257U CPU @ 2.70GHz (0.0 bogomips)
MMX, Physical Address Ext, SYSENTER/SYSEXIT, Intel virtualization
@applch
applch / UnixBenchmark macOS 10.13.3 (Build 17D47)
Last active January 24, 2018 13:09
macOS 10.13.3 (Build 17D47) Post-Meltdown Patch UnixBenchmark
BYTE UNIX Benchmarks (Version 5.1.3)
System: hai3noMacBook-puro.local: Darwin
OS: Darwin -- 17.4.0 -- Darwin Kernel Version 17.4.0: Sun Dec 17 09:19:54 PST 2017; root:xnu-4570.41.2~1/RELEASE_X86_64
Machine: x86_64 (unknown)
Language: en_US.utf8 (charmap="US-ASCII", collate=)
CPU 0: Intel(R) Core(TM) i5-5257U CPU @ 2.70GHz (0.0 bogomips)
MMX, Physical Address Ext, SYSENTER/SYSEXIT, Intel virtualization
CPU 1: Intel(R) Core(TM) i5-5257U CPU @ 2.70GHz (0.0 bogomips)
MMX, Physical Address Ext, SYSENTER/SYSEXIT, Intel virtualization
@applch
applch / UnixBenchmark macOS 10.12.6 (16G1212)
Created January 24, 2018 13:09
macOS 10.12.6 (16G1212) Post-Meltdown Patch UnixBenchmark
BYTE UNIX Benchmarks (Version 5.1.3)
System: Sierra6spnoMacBook-Pro.local: Darwin
OS: Darwin -- 16.7.0 -- Darwin Kernel Version 16.7.0: Thu Jan 11 22:59:40 PST 2018; root:xnu-3789.73.8~1/RELEASE_X86_64
Machine: x86_64 (unknown)
Language: en_US.utf8 (charmap="US-ASCII", collate=)
CPU 0: Intel(R) Core(TM) i5-5257U CPU @ 2.70GHz (0.0 bogomips)
MMX, Physical Address Ext, SYSENTER/SYSEXIT, Intel virtualization
CPU 1: Intel(R) Core(TM) i5-5257U CPU @ 2.70GHz (0.0 bogomips)
MMX, Physical Address Ext, SYSENTER/SYSEXIT, Intel virtualization
@applch
applch / ESET issue after security update 2018-001
Last active January 25, 2018 23:50
Spectre/Meltdown mitigations cause errors on macOS 10.13.2 and earlier with ESET Cyber Security and Cyber Security Pro
Spectre/Meltdown mitigations cause errors on macOS 10.13.2 and earlier with ESET Cyber Security and Cyber Security Pro
Applies to: ESET home products for macOS
Following the installation of Apple mitigations for the Meltdown and Spectre vulnerabilities in the macOS versions 10.11.6, 10.12.6 and 10.13.2 supplemental update, system errors can occur when ESET Cyber Security and Cyber Security Pro are opened.
Follow the steps below to avoid system errors according to your macOS operating system version:
macOS users version 10.11 and 10.12
macOS users version 10.13
About the security content of macOS High Sierra 10.13.3, Security Update 2018-001 Sierra, and Security Update 2018-001 El Capitan
This document describes the security content of macOS High Sierra 10.13.3, Security Update 2018-001 Sierra, and Security Update 2018-001 El Capitan.
About Apple security updates
For our customers' protection, Apple doesn't disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available. Recent releases are listed on the Apple security updates page.
For more information about security, see the Apple Product Security page. You can encrypt communications with Apple using the Apple Product Security PGP Key.
Apple security documents reference vulnerabilities by CVE-ID when possible.
Prepare for changes to macOS Server
As hosted services have become widespread—and the need to keep software up to date is more important than ever—Apple is making some changes to macOS Server.
Learn about current and future support
Apple will continue to develop and support macOS Server, which includes Open Directory, Profile Manager, and Xsan management. The most popular server features—Caching Server, File Sharing Server, and Time Machine Server—have been bundled with every installation of macOS High Sierra since its release in fall 2017, so that even more customers have access to these essential services at no extra cost.
In fall 2018, Apple will stop bundling open source services such as Calendar Server, Contacts Server, the Mail Server, DNS, DHCP, VPN Server, and Websites with macOS Server. Customers can get these same services directly from open-source providers. This way, macOS Server customers can install the most secure and up-to-date services as soon as they’re available.
Because these open-sou
00c34b01d7ceb48f32d0d72017d768f88a6c1a3edc9f51fb5803d52b53aa8bc4
0474b466151470ca175c397982e0320ac49c6f355796cc6a04326ba1c4e80679
06391591f2436ed4401babaf1cb5b04cdc49715913eabc794db3dda1ef7a6d00
07b2bc7a0f96a4c733f5a26443be4d2bad02a8ee5b89b4a4e4efd2bdf889d699
07c7e4d9d716c48b9eb5ad32f45d5036ecfbe544f3a4ce318c3aabe6e36c6e2e
096b4e4debed2090f96abb3531d2c4f4497834ec770c9af1112cb2bf71dbc5ae
09d388ca74f5fd26ad46af73f2455a157a18f6a3097de20acedcdf73d2487856
09d7edd39a60aba76b7cd18bbeacee62393bf206aabe9c4e5fe03cfaf05e1d5e
105249d1725de95b5391b1eac959c6968729d7595a46370e68c453e6febadc19
14608aeec352d1a1197f3d9cbc354c57a7d32cee1bc42c14feb4bcbc769e36bd
@applch
applch / Safari Password Generator known popular web site.
Created February 5, 2018 11:03
/Applications/Safari Technology Preview.app/Contents/Frameworks/SafariShared.framework/Versions/A/Resources/WBSAutoFillQuirks.plist
About the security content of macOS High Sierra 10.13.3 Supplemental Update
This document describes the security content of macOS High Sierra 10.13.3 Supplemental Update.
About Apple security updates
For our customers' protection, Apple doesn't disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available. Recent releases are listed on the Apple security updates page.
For more information about security, see the Apple Product Security page. You can encrypt communications with Apple using the Apple Product Security PGP Key.
Apple security documents reference vulnerabilities by CVE-ID when possible.
About the security content of iOS 11.2.6
This document describes the security content of iOS 11.2.6.
About Apple security updates
For our customers' protection, Apple doesn't disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available. Recent releases are listed on the Apple security updates page.
For more information about security, see the Apple Product Security page. You can encrypt communications with Apple using the Apple Product Security PGP Key.
Apple security documents reference vulnerabilities by CVE-ID when possible.