Sponsored Content
Operating Systems OS X (Apple) Converting Unix executable files Post 47518 by [MA]Flying_Meat on Thursday 12th of February 2004 02:24:22 AM
Old 02-12-2004
I'll warrant the OS upgrade had nothing to do with the situation you find your text files in.

If they are just text files and not MS Word files then you should be able to open them with TextEdit.

If they are rtf documents you should still be able to open them from the "Open..." item in the TextEdit "File" menu.

Do you have one of the problem files that you are pretty certain does not contain sensitive information? Perhaps someone can examine it with your assistance and tell you what you need to do to resolve the problem.
 

9 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

converting files from unix to windows

Need Help?? We receive Files From GM Motors and they written on a Sun Workstation using the Tar Command on a 4mm Dat Tape. We have an HP sure Store 24 Tape drive that will Execpt but when i do that it says that the media is bad. was wondering if there was any software that would read it in its... (2 Replies)
Discussion started by: jefft1976
2 Replies

2. OS X (Apple)

Cannot translate Unix executable files

Help!! I loaded OS X Panther on my Mac G4 and found that many files previously saved as txt files were inadventently converted to Unix executable files. When I try to read these in Word, the Word filters cannot recognize or translate the file properly. Does anyone know how to translate these files?... (1 Reply)
Discussion started by: Steven Greenber
1 Replies

3. UNIX for Dummies Questions & Answers

Cannot run UNIX executable !

I have installed the Darwin Calendar Server on my Mac and got it working. To start the server I open a Finder window on my mac and click the UNIX executable called RUN. In order to start the server automatically on bootup I used LINGON to add a startup Daemon to call "RUN -d". When I reboot... (6 Replies)
Discussion started by: thylacine
6 Replies

4. UNIX for Dummies Questions & Answers

listing executable files in unix.

How to list out the files which are not accessed for the last n days? and How to list out all the executable files in a directory? can anyone help me on the above? Thanks in advance. (3 Replies)
Discussion started by: venkatesht
3 Replies

5. UNIX for Dummies Questions & Answers

executable files

hello. My question, basically is: what is the definition of unix/linux exec files, or what makes a file executable? More specifically, must a unix source file that was compiled using gcc have exec permissions in order to be considered executable? Is it right to say that a unix/linux exec file... (1 Reply)
Discussion started by: nadavkri
1 Replies

6. Shell Programming and Scripting

unix executable file

Hi - How can I find out under sh whitch file is an unix executable file? Need it for an software inventory. Thanks in advance. Regards - Lazybaer (6 Replies)
Discussion started by: lazybaer
6 Replies

7. OS X (Apple)

Plist to Unix Executable

I'm using an old conversion method for converting a plist into an XML file, but that's not what I'm needing just via terminal now. What I'm looking for is an answer to convert a plist file into an executable. I'd like to import it into Casper and have the JSS push it out onto an image. In this... (6 Replies)
Discussion started by: unimachead
6 Replies

8. UNIX for Dummies Questions & Answers

Archived Emails in UNIX Executable Files

Hello, A while back someone"archived" my emails for me, so I didn't have to worry about my email account filling up with emails. I need to get back into those emails and view them. When I opent the folder it has several files. The largest being an "mbox", which I am assuming has all of... (3 Replies)
Discussion started by: shaffer1921
3 Replies

9. UNIX for Dummies Questions & Answers

Problems with Dutch and converting files to UNIX

Dear All, for last few days I am dealing with silly problem of converting files from different types and styles (ansi, utf) in dutch to a normal unix files with utf-8 without BOM ... using both linux terminal and cygwin and no matter what I have no been successful the files has hidden... (8 Replies)
Discussion started by: A-V
8 Replies
asctl(1)						    BSD General Commands Manual 						  asctl(1)

NAME
asctl -- App Sandbox Control Tool SYNOPSIS
asctl [-p] [-l] command [arguments] DESCRIPTION
asctl is a facility for manipulating the filesystem container for an applications using App Sandbox. A container is a per-application filesytem hierarchy rooted in ~/Library/Containers. GENERAL COMMANDS
help Prints a summary of commands and their behaviours. sandbox check <app specification> Determines with the given application is signed with App Sandbox entitlements. In addition, if the application is specified by pid using the --pid syntax, prints out whether the application is actually running with App Sandbox enabled, a traditional sandbox, or no sandbox at all. CONTAINER MANAGEMENT COMMANDS
The following commands manage filesystem containers for sandboxed apps. container path <app specification> Print the path to the application's container. container create <app specification> Create and initialize the application's container. Containers are normally created automatically when sandboxed applications are run. This command creates the container for an application without running the application. container upgrade <app specification> Upgrade the application's container to the current container schema. Existing containers are normally automatically upgraded to the latest container schema when their associated applications are run. This command upgrades an existing container without running the associated application. container repair <app specification> Repair a container's structure by re-creating missing files and symlinks, repairing file permissions so that files are owned by and accessible to the current user, and rebuilding the application's sandbox information. This operation may require authorization by the user. CONTAINER ACL MANAGEMENT COMMANDS
Each container has an access control list comprised of code requirements. A sandboxed application must satify one or more of the code requirements on their container in order to run. The following commands manipulate the container's access control list: container acl add <app specification> Update the access control list for the application's container to include the application's designated code requirement. container acl add <app specification> <code requirement> Update the access control list for the application's container to include the specified code requirement. container acl update <app specification> Update the access control list for the application's container such that it consists of only the application's designated code requirement. Any other code requirements will be removed from the ACL. container acl list <app specification> Print list of code requirements in the access control list for the given application's container. container acl validate <app specification> Validate the application against each of the code requirements in its container's access control list. Each code requirement in the ACL is labeled with one of the following: [FAIL] application does not validate against code requirement. [VALID] application validates against code requirement. [EXACT] application validates against code requirement and code requirement is the same as the application's designated code requirement. container acl verify <app specification> Synonym for acl validate. SYMLINK SUPPORT COMMANDS
App Sandbox will follow any symlinks in the paths to users' home directories. In addition, it has a whitelist of other locations where it will acknowledge and honor symbolic links. Any symlinks not in this whitelist will not be followed and, as a result, App Sandboxed applica- tions will not have access to the paths that the symlinks refer to. The following command displays the whitelist of paths where App Sandbox will acknowledge symlinks at: symlink list <path ...> Display the list of paths that App Sandbox searches for symlinks and, for any paths that are symlinks, display where the symlinks currently resolve to. DIAGNOSTIC COMMAND
Collect diagnostic information related to Application Sandboxing and containers. The information is collected into a single file that can be sent to Apple to aid in diagnosing problems when an application runs inside of a sandbox. Should you choose to send the diagnostic informa- tion to Apple, then you must agree to this disclaimer: This diagnostic tool generates files that allow Apple to investigate issues with your computer and help Apple to improve its products. The generated files may contain some of your personal information, which may include, but not be limited to, the serial number or similar unique number for your device, your user name, your file names or your computer name. The information is used by Apple in accordance with its pri- vacy policy (www.apple.com/privacy) and is not shared with any third party. By enabling this diagnostic tool and sending a copy of the gen- erated files to Apple, you are consenting to Apple's use of the content of such files. Additional information concerning a specific application can be gathered via the app subcommand. This command must be run as 'root'. The following command collects diagnostic information: diagnose [--no-compress | --no-disclaimer | --no-reveal | --no-verbose] [app <app specification>] Collection diagnostic information. Outputs the path to the folder or file containing the information. Optional arguments: --no-compress Do not compress the folder containing the dianostic files into a Zip file. --no-disclaimer Do not show the disclaimer. Use of this option constitutes acceptance of the disclaimer. --no-reveal Do not reveal the resulting diagnostic file in Finder. --no-verbose Do not show verbose output while running the diagnostic. Optional subcommand: app <app specification> Specify an application for which additional information will be gathered. GLOBAL OPTIONS
-p By default, asctl displays paths relative to the user's home directory. This flag causes any paths in the output to be displayed as absolute paths instead. -l Write internal logging information to a temporary file. APPLICATION SPECIFIERS
Many commands require an application specification as one of their arguments. Applications can be specified any of the following ways: <name> The application name as it appears in the Applications folder, with or without the .app extension. For example, "TextEdit". <path> The path to the application binary or bundle. For example, /Applications/TextEdit.app. --file <path> Explicitly indicate the following argument is to be interpreted as the path to the application binary or bundle. The --file flag removes ambiguity when an argument can be interpreted as either an application name or a valid path to an application. For example, --file /Applications/TextEdit.app. --bundle <bundle Id> Interpret the following argument as the bunder identifier of the application. For example, --bundle com.apple.TextEdit. --pid <process Id> Interpret the following argument as the process identifier of a running application. For example, --pid 1. --container-path <path to container> Interpret the following argument as a path to an existing container and determine the application for that container . For example, --container-path ~/Library/Containers/com.apple.TextEdit. FILES
~/Library/Containers The user's containers folder. SEE ALSO
codesign(1) HISTORY
The asctl command first appeared in Mac OS X Version 10.7. Darwin February 20, 2014 Darwin
All times are GMT -4. The time now is 08:53 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy