Author: Topher Nadauld

The Pre-JNUC 2019 Meetup is happening again this year on Monday, November 11th at 7 pm at The Local. Hope to see everyone there....

OverviewThere are several ways to access an enterprise wireless network. You might use 802.1X with PEAP or some other form of the Extensible Authentication Protocol (EAP). For device based internet, EAP-TLS is the authentication protocol used to connect to the wireless network. EAP-TLS uses Simple Certificate Enrollment...

OverviewJamf Pro server can be a funny and fickle beast. When testing different policies that are unique or upgrading to a new version of Jamf Pro, it's best not to try it on the production server first. Sometimes the process of testing a new release...

Overview System Integrity Protection or "SIP" is a new security measure implemented in 10.11 "El Capitan". SIP protects access to system locations and restricting runtime attachment to system processes, this security policy guards against compromise — whether accidental or by malicious code. SIP protects file system locations...

OverviewIn this post we will be talking about file descriptors and increasing limit descriptors in OS X Yosemite. File descriptors are limited by the OS. This causes some applications and services to return errors. By increasing the limit of file descriptors we can reduce the amount...