This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| BYTE UNIX Benchmarks (Version 5.1.3) | |
| System: hai10132noMacBook-puro.local: Darwin | |
| OS: Darwin -- 17.3.0 -- Darwin Kernel Version 17.3.0: Thu Nov 9 18:09:22 PST 2017; root:xnu-4570.31.3~1/RELEASE_X86_64 | |
| Machine: x86_64 (unknown) | |
| Language: en_US.utf8 (charmap="US-ASCII", collate=) | |
| CPU 0: Intel(R) Core(TM) i5-5257U CPU @ 2.70GHz (0.0 bogomips) | |
| MMX, Physical Address Ext, SYSENTER/SYSEXIT, Intel virtualization | |
| CPU 1: Intel(R) Core(TM) i5-5257U CPU @ 2.70GHz (0.0 bogomips) | |
| MMX, Physical Address Ext, SYSENTER/SYSEXIT, Intel virtualization |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| BYTE UNIX Benchmarks (Version 5.1.3) | |
| System: hai3noMacBook-puro.local: Darwin | |
| OS: Darwin -- 17.4.0 -- Darwin Kernel Version 17.4.0: Sun Dec 17 09:19:54 PST 2017; root:xnu-4570.41.2~1/RELEASE_X86_64 | |
| Machine: x86_64 (unknown) | |
| Language: en_US.utf8 (charmap="US-ASCII", collate=) | |
| CPU 0: Intel(R) Core(TM) i5-5257U CPU @ 2.70GHz (0.0 bogomips) | |
| MMX, Physical Address Ext, SYSENTER/SYSEXIT, Intel virtualization | |
| CPU 1: Intel(R) Core(TM) i5-5257U CPU @ 2.70GHz (0.0 bogomips) | |
| MMX, Physical Address Ext, SYSENTER/SYSEXIT, Intel virtualization |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| BYTE UNIX Benchmarks (Version 5.1.3) | |
| System: Sierra6spnoMacBook-Pro.local: Darwin | |
| OS: Darwin -- 16.7.0 -- Darwin Kernel Version 16.7.0: Thu Jan 11 22:59:40 PST 2018; root:xnu-3789.73.8~1/RELEASE_X86_64 | |
| Machine: x86_64 (unknown) | |
| Language: en_US.utf8 (charmap="US-ASCII", collate=) | |
| CPU 0: Intel(R) Core(TM) i5-5257U CPU @ 2.70GHz (0.0 bogomips) | |
| MMX, Physical Address Ext, SYSENTER/SYSEXIT, Intel virtualization | |
| CPU 1: Intel(R) Core(TM) i5-5257U CPU @ 2.70GHz (0.0 bogomips) | |
| MMX, Physical Address Ext, SYSENTER/SYSEXIT, Intel virtualization |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Spectre/Meltdown mitigations cause errors on macOS 10.13.2 and earlier with ESET Cyber Security and Cyber Security Pro | |
| Applies to: ESET home products for macOS | |
| Following the installation of Apple mitigations for the Meltdown and Spectre vulnerabilities in the macOS versions 10.11.6, 10.12.6 and 10.13.2 supplemental update, system errors can occur when ESET Cyber Security and Cyber Security Pro are opened. | |
| Follow the steps below to avoid system errors according to your macOS operating system version: | |
| macOS users version 10.11 and 10.12 | |
| macOS users version 10.13 | |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| About the security content of macOS High Sierra 10.13.3, Security Update 2018-001 Sierra, and Security Update 2018-001 El Capitan | |
| This document describes the security content of macOS High Sierra 10.13.3, Security Update 2018-001 Sierra, and Security Update 2018-001 El Capitan. | |
| About Apple security updates | |
| For our customers' protection, Apple doesn't disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available. Recent releases are listed on the Apple security updates page. | |
| For more information about security, see the Apple Product Security page. You can encrypt communications with Apple using the Apple Product Security PGP Key. | |
| Apple security documents reference vulnerabilities by CVE-ID when possible. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Prepare for changes to macOS Server | |
| As hosted services have become widespread—and the need to keep software up to date is more important than ever—Apple is making some changes to macOS Server. | |
| Learn about current and future support | |
| Apple will continue to develop and support macOS Server, which includes Open Directory, Profile Manager, and Xsan management. The most popular server features—Caching Server, File Sharing Server, and Time Machine Server—have been bundled with every installation of macOS High Sierra since its release in fall 2017, so that even more customers have access to these essential services at no extra cost. | |
| In fall 2018, Apple will stop bundling open source services such as Calendar Server, Contacts Server, the Mail Server, DNS, DHCP, VPN Server, and Websites with macOS Server. Customers can get these same services directly from open-source providers. This way, macOS Server customers can install the most secure and up-to-date services as soon as they’re available. | |
| Because these open-sou |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| 00c34b01d7ceb48f32d0d72017d768f88a6c1a3edc9f51fb5803d52b53aa8bc4 | |
| 0474b466151470ca175c397982e0320ac49c6f355796cc6a04326ba1c4e80679 | |
| 06391591f2436ed4401babaf1cb5b04cdc49715913eabc794db3dda1ef7a6d00 | |
| 07b2bc7a0f96a4c733f5a26443be4d2bad02a8ee5b89b4a4e4efd2bdf889d699 | |
| 07c7e4d9d716c48b9eb5ad32f45d5036ecfbe544f3a4ce318c3aabe6e36c6e2e | |
| 096b4e4debed2090f96abb3531d2c4f4497834ec770c9af1112cb2bf71dbc5ae | |
| 09d388ca74f5fd26ad46af73f2455a157a18f6a3097de20acedcdf73d2487856 | |
| 09d7edd39a60aba76b7cd18bbeacee62393bf206aabe9c4e5fe03cfaf05e1d5e | |
| 105249d1725de95b5391b1eac959c6968729d7595a46370e68c453e6febadc19 | |
| 14608aeec352d1a1197f3d9cbc354c57a7d32cee1bc42c14feb4bcbc769e36bd |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| <?xml version="1.0" encoding="UTF-8"?> | |
| <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> | |
| <plist version="1.0"> | |
| <dict> | |
| <key>DomainsWithAssociatedCredentials</key> | |
| <array> | |
| <array> | |
| <string>comcast.net</string> | |
| <string>xfinity.com</string> | |
| </array> |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| About the security content of macOS High Sierra 10.13.3 Supplemental Update | |
| This document describes the security content of macOS High Sierra 10.13.3 Supplemental Update. | |
| About Apple security updates | |
| For our customers' protection, Apple doesn't disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available. Recent releases are listed on the Apple security updates page. | |
| For more information about security, see the Apple Product Security page. You can encrypt communications with Apple using the Apple Product Security PGP Key. | |
| Apple security documents reference vulnerabilities by CVE-ID when possible. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| About the security content of iOS 11.2.6 | |
| This document describes the security content of iOS 11.2.6. | |
| About Apple security updates | |
| For our customers' protection, Apple doesn't disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available. Recent releases are listed on the Apple security updates page. | |
| For more information about security, see the Apple Product Security page. You can encrypt communications with Apple using the Apple Product Security PGP Key. | |
| Apple security documents reference vulnerabilities by CVE-ID when possible. |