Sponsored Content
Operating Systems OS X (Apple) loading MAC X 5.0(leopard) on a X86 laptop Post 302209673 by DukeNuke2 on Friday 27th of June 2008 04:07:54 PM
Old 06-27-2008
this is not allowed to do. afaik mac software is for mac computers only. thread closed!
 

3 More Discussions You Might Find Interesting

1. OS X (Apple)

Mac OS X in laptop

Does it worth, to buy a laptop with Mac OS X? Thank you in advance! (4 Replies)
Discussion started by: SolidSnake
4 Replies

2. Shell Programming and Scripting

mac backup script in leopard

Hi all I had a nice simple backup script on my mac running Tiger. I used an Automator 'Run Shell Script' command that loaded psync and backed up one directory on an external drive to a directory on another external drive. This was the command /usr/local/bin/runpsync 0 0 0... (1 Reply)
Discussion started by: Billy T
1 Replies

3. OS X (Apple)

Use a Serial Console with Mac OS X Leopard

I'm trying to use an old Commodore 128D as a terminal to access OS X's shell via a serial port. I've used 'screen' and 'zterm' to ensure the two machines are successfully interfaced. Instructions for opening up the serial console on other Unix-y operating systems don't work with OS X Leopard. ... (3 Replies)
Discussion started by: joecassara
3 Replies
MAC_SEEOTHERUIDS(4)					   BSD Kernel Interfaces Manual 				       MAC_SEEOTHERUIDS(4)

NAME
mac_seeotheruids -- simple policy controlling whether users see other users SYNOPSIS
To compile the policy into your kernel, place the following lines in your kernel configuration file: options MAC options MAC_SEEOTHERUIDS Alternately, to load the module at boot time, place the following line in your kernel configuration file: options MAC and in loader.conf(5): mac_seeotheruids_load="YES" DESCRIPTION
The mac_seeotheruids policy module, when enabled, denies users to see processes or sockets owned by other users. To enable mac_seeotheruids, set the sysctl OID security.mac.seeotheruids.enabled to 1. To permit superuser awareness of other credentials by virtue of privilege, set the sysctl OID security.mac.seeotheruids.suser_privileged to 1. To allow users to see processes and sockets owned by the same primary group, set the sysctl OID security.mac.seeotheruids.primarygroup_enabled to 1. To allow processes with a specific group ID to be exempt from the policy, set the sysctl OID security.mac.seeotheruids.specificgid_enabled to 1, and security.mac.seeotheruids.specificgid to the group ID to be exempted. Label Format No labels are defined for mac_seeotheruids. SEE ALSO
mac(4), mac_biba(4), mac_bsdextended(4), mac_ifoff(4), mac_lomac(4), mac_mls(4), mac_none(4), mac_partition(4), mac_portacl(4), mac_test(4), mac(9) HISTORY
The mac_seeotheruids policy module first appeared in FreeBSD 5.0 and was developed by the TrustedBSD Project. AUTHORS
This software was contributed to the FreeBSD Project by Network Associates Labs, the Security Research Division of Network Associates Inc. under DARPA/SPAWAR contract N66001-01-C-8035 (``CBOSS''), as part of the DARPA CHATS research program. BUGS
See mac(9) concerning appropriateness for production use. The TrustedBSD MAC Framework is considered experimental in FreeBSD. While the MAC Framework design is intended to support the containment of the root user, not all attack channels are currently protected by entry point checks. As such, MAC Framework policies should not be relied on, in isolation, to protect against a malicious privileged user. BSD
October 6, 2005 BSD
All times are GMT -4. The time now is 10:15 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy