Function | Shortcut |
---|---|
New Tab | ⌘ + T |
Close Tab or Window | ⌘ + W (same as many mac apps) |
Go to Tab | ⌘ + Number Key (ie: ⌘2 is 2nd tab) |
Go to Split Pane by Direction | ⌘ + Option + Arrow Key |
Cycle iTerm Windows | ⌘ + backtick (true of all mac apps and works with desktops/mission control) |
import objc | |
from Foundation import NSBundle | |
IOKit_bundle = NSBundle.bundleWithIdentifier_('com.apple.framework.IOKit') | |
functions = [("IOServiceGetMatchingService", b"II@"), | |
("IOServiceMatching", b"@*"), | |
("IORegistryEntryCreateCFProperty", b"@I@@I"), | |
] |
#!/usr/bin/env bash | |
# Fetch the password from the keychain if it exists | |
PASSWORD_ENTERED=false | |
ACCOUNT_NAME='login' | |
SERVICE_NAME='mount_volume' | |
PASSWORD=$( | |
security 2> /dev/null \ | |
find-generic-password -w \ | |
-a $ACCOUNT_NAME \ |
#!/usr/bin/python | |
# pylint: disable=C0103, W0612, E1101, E0602, E0611 | |
# pylint: disable=W0101, W0110, W0141 | |
''''Fix 802.1x When Using Config Profiles and EAP-TLS''' | |
# # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # # | |
# | |
# This script will determine the profile ID that was used when | |
# installing the 802.1x Ethernet Identity preference and make | |
# a copy of the keychain entry to be used as a user identity preference | |
# so that any Ethernet can be used when a user is logged in. As of 10.12.3 |
#!/usr/bin/python | |
import os | |
import sys | |
from CoreFoundation import (CFPreferencesAppValueIsForced, | |
CFPreferencesCopyAppValue, | |
CFPreferencesCopyValue, | |
kCFPreferencesAnyUser, | |
kCFPreferencesAnyHost, |
The Jamf Pro GUI allows you to automatically set up the necessary payloads to manage the FDE Recovery Key Escrow process for macOS 10.13+.
However, the settings reside in the "Security & Privacy" grouping within the Jamf Pro GUI, forcing you to manage settings other than those related to recovery key escrow. You may inadvertently lock your users out of being able to make changes to the firewall, analytics settings, screen saver password requirement, etc.
You can upload a custom profile to the Jamf Pro Server that manages only FDE Recover Key Escrow preferences, but it takes a little work.
You'll also need to sign your resultant configuration profile to prevent the Jamf Pro Server from manipulating its contents or preventing deployment. You can use an Apple Developer certificate, or your Jamf Pro Server's CA (if self signed).
#!/usr/bin/python | |
import subprocess | |
import plistlib | |
cmd = ['/usr/sbin/system_profiler', '-xml', 'SPApplicationsDataType'] | |
proc = subprocess.Popen(cmd, shell=False, bufsize=-1, stdin=subprocess.PIPE, stdout=subprocess.PIPE, stderr=subprocess.PIPE) | |
output, err = proc.communicate() | |
plist = plistlib.readPlistFromString(output) | |
items = plist[0]['_items'] | |
for item in sorted(items, key=lambda x: x.get('path')): |
#!/bin/zsh | |
# provide for Big Sur and earlier | |
xpath() { | |
# the xpath tool changes in Big Sur | |
if [[ $( /usr/bin/sw_vers -buildVersion) > "20A" ]]; then | |
/usr/bin/xpath -e "$@" | |
else | |
/usr/bin/xpath "$@" | |
fi |
#!/bin/sh | |
# template script for running a command as user | |
# The presumption is that this script will be executed as root from a launch daemon | |
# or from some management agent. To execute a single command as the current user | |
# you can use the `runAsUser` function below. | |
# by Armin Briegel - Scripting OS X | |
# |
#!/usr/local/bin/python3 | |
"""Bulk adds the 'arm64,x86_64' value as and advanced option for '.pkgproj' files. | |
Walks all sub directories specified at '[path]' for '.pkgproj' files, makes a backup | |
file in the same destination. | |
Does not add the value if a value already exists. | |
Usage: ./add_hostArchitectures.py [path] | |
Tested with Python 3.7.9. | |
""" |