Bash

OverviewWe have implemented multiple forms of kiosk throughout the years at the Marriott Library or other locations on campus that we support. Initially, we implemented web kiosks that provided anonymous users at the Marriott Library quick access to limited library & campus resources like the...

OverviewJamf Pro server can be a funny and fickle beast. When testing different policies that are unique or upgrading to a new version of Jamf Pro, it's best not to try it on the production server first. Sometimes the process of testing a new release...

OverviewThis blog was created from the first multi-part of a presentation at the June 2017 University of Utah MacAdmin meeting which covers in-depth information on managing settings on Mac systems including property lists format, naming, preference search paths, file system locations and structure and parts....

Overview System Integrity Protection or "SIP" is a new security measure implemented in 10.11 "El Capitan". SIP protects access to system locations and restricting runtime attachment to system processes, this security policy guards against compromise — whether accidental or by malicious code. SIP protects file system locations...

OverviewRecently, we received our order for the book "Enterprise Mac Administrator's Guide: Second Edition" written by  Charles Edge and William Smith. This book provides detailed explanations of the technology required for large-scale Mac OS X deployments and show you how to integrate it with other operating systems and applications....

OverviewIn this post we will be talking about file descriptors and increasing limit descriptors in OS X Yosemite. File descriptors are limited by the OS. This causes some applications and services to return errors. By increasing the limit of file descriptors we can reduce the amount...