Disentangling timestamps with Dropera 2
Study how the four key timestamps of a file change when you create, edit, preview the file, using Dropera.
Apple has released its weekly update to XProtect, bringing it to version 5317. As usual, it doesn’t release information about what security issues this update might add or change.
This version adds five new detection signatures to its Yara file. These include another newcomer with four signatures, MACOS.DAILYDUMPLING, and MACOS.SOMA.SEEND to add to the large Amos/Soma family.
You can check whether this update has been installed by opening System Information via About This Mac, and selecting the Installations item under Software.
A full listing of security data file versions is given by SilentKnight and SystHist for El Capitan to Tahoe available from their product page. If your Mac hasn’t yet installed this update, you can force it using SilentKnight or at the command line.
If you want to install this as a named update in SilentKnight, its label is XProtectPlistConfigData_10_15-5317
I apologise for the late announcement of this update, which seems to have been released after 22:00 GMT on 30 September, but was still incomplete here through the whole of today, 1 October.
Sequoia and Tahoe systems only
This update has already been released for Sequoia and Tahoe via iCloud. If you want to check it manually, use the Terminal command
sudo xprotect check
then enter your admin password. If that returns version 5317 but your Mac still reports an older version is installed, you should be able to force the update using
sudo xprotect update
Disentangling timestamps with Dropera 2
Study how the four key timestamps of a file change when you create, edit, preview the file, using Dropera.
Apple has released its weekly update to XProtect, bringing it to version 5317. As usual, it doesn’t release information about what security issues this update might add or change.
This version adds five new detection signatures to its Yara file. These include another newcomer with four signatures, MACOS.DAILYDUMPLING, and MACOS.SOMA.SEEND to add to the large Amos/Soma family.
You can check whether this update has been installed by opening System Information via About This Mac, and selecting the Installations item under Software.
A full listing of security data file versions is given by SilentKnight and SystHist for El Capitan to Tahoe available from their product page. If your Mac hasn’t yet installed this update, you can force it using SilentKnight or at the command line.
If you want to install this as a named update in SilentKnight, its label is XProtectPlistConfigData_10_15-5317
I apologise for the late announcement of this update, which seems to have been released after 22:00 GMT on 30 September, but was still incomplete here through the whole of today, 1 October.
Sequoia and Tahoe systems only
This update has already been released for Sequoia and Tahoe via iCloud. If you want to check it manually, use the Terminal command
sudo xprotect check
then enter your admin password. If that returns version 5317 but your Mac still reports an older version is installed, you should be able to force the update using
sudo xprotect update
Wersje RC systemów 26.1
Dziś wieczorem Apple opublikowało wersje RC wszystkich sytemów 26.1. Oznacza to, że oficjalne aktualizacje są już coraz bliżej.
Minął tydzień od ostatnich – czwartych wersji beta, a już pojawiły się Release Candidate.
Najważniejsza nowość w niemal wszystkich nadchodzących aktualizacjach to możliwość stonowania przezroczystości Liquid Glass. Apple zdecydowanie nie dopracował tego wyglądu i choć deweloperzy w fazie testów przed publiczną premierą systemów z numerem 26 o tym powszechnie mówili, dopiero oficjalna wersja i dołączenie do głosu zwykłych użytkowników zmusił Apple, aby coś w końcu z tym zrobić.
Ponieważ jesteśmy już w fazie wersji RC, możemy się spodziewać, że niedługo systemy 26.1 zostaną udostępnione publicznie, być może już na początku przyszłego tygodnia.
#AppleTV #AppleVisionPro #AppleWatch #iOS #iOS26 #iPad #iPadOS #iPadOS26 #iPhone #Mac #macOS #macOS26 #Tahoe #tvOS #tvOS26 #visionOS #visionOS26 #watchOS #watchOS26
Wersje RC systemów 26.1
Dziś wieczorem Apple opublikowało wersje RC wszystkich sytemów 26.1. Oznacza to, że oficjalne aktualizacje są już coraz bliżej.
Minął tydzień od ostatnich – czwartych wersji beta, a już pojawiły się Release Candidate.
Najważniejsza nowość w niemal wszystkich nadchodzących aktualizacjach to możliwość stonowania przezroczystości Liquid Glass. Apple zdecydowanie nie dopracował tego wyglądu i choć deweloperzy w fazie testów przed publiczną premierą systemów z numerem 26 o tym powszechnie mówili, dopiero oficjalna wersja i dołączenie do głosu zwykłych użytkowników zmusił Apple, aby coś w końcu z tym zrobić.
Ponieważ jesteśmy już w fazie wersji RC, możemy się spodziewać, że niedługo systemy 26.1 zostaną udostępnione publicznie, być może już na początku przyszłego tygodnia.
#AppleTV #AppleVisionPro #AppleWatch #iOS #iOS26 #iPad #iPadOS #iPadOS26 #iPhone #Mac #macOS #macOS26 #Tahoe #tvOS #tvOS26 #visionOS #visionOS26 #watchOS #watchOS26
Dear #macos and #windows #musician (s) and #musicproducer (s),
what #plugin #vendor (s) would you need natively on #linux in order to be able to consider moving your music production to #linuxaudio?
I have already asked the following vendors for support:
https://linuxaudio.dev/linux-support-request-tracking
I am interested to hear if, from your perspective, there are vendors missing on the list.
Thank you in advance for your help! 🙌
Dear #macos and #windows #musician (s) and #musicproducer (s),
what #plugin #vendor (s) would you need natively on #linux in order to be able to consider moving your music production to #linuxaudio?
I have already asked the following vendors for support:
https://linuxaudio.dev/linux-support-request-tracking
I am interested to hear if, from your perspective, there are vendors missing on the list.
Thank you in advance for your help! 🙌
Solutions to Saturday Mac riddles 331
I hope that you enjoyed Saturday’s Mac Riddles, episode 331. Here are my solutions to them. 1: A […]
Apple has released its weekly update to XProtect, bringing it to version 5317. As usual, it doesn’t release information about what security issues this update might add or change.
This version adds five new detection signatures to its Yara file. These include another newcomer with four signatures, MACOS.DAILYDUMPLING, and MACOS.SOMA.SEEND to add to the large Amos/Soma family.
You can check whether this update has been installed by opening System Information via About This Mac, and selecting the Installations item under Software.
A full listing of security data file versions is given by SilentKnight and SystHist for El Capitan to Tahoe available from their product page. If your Mac hasn’t yet installed this update, you can force it using SilentKnight or at the command line.
If you want to install this as a named update in SilentKnight, its label is XProtectPlistConfigData_10_15-5317
I apologise for the late announcement of this update, which seems to have been released after 22:00 GMT on 30 September, but was still incomplete here through the whole of today, 1 October.
Sequoia and Tahoe systems only
This update has already been released for Sequoia and Tahoe via iCloud. If you want to check it manually, use the Terminal command
sudo xprotect check
then enter your admin password. If that returns version 5317 but your Mac still reports an older version is installed, you should be able to force the update using
sudo xprotect update
Solutions to Saturday Mac riddles 331
I hope that you enjoyed Saturday’s Mac Riddles, episode 331. Here are my solutions to them. 1: A […]
Apple has released its weekly update to XProtect, bringing it to version 5317. As usual, it doesn’t release information about what security issues this update might add or change.
This version adds five new detection signatures to its Yara file. These include another newcomer with four signatures, MACOS.DAILYDUMPLING, and MACOS.SOMA.SEEND to add to the large Amos/Soma family.
You can check whether this update has been installed by opening System Information via About This Mac, and selecting the Installations item under Software.
A full listing of security data file versions is given by SilentKnight and SystHist for El Capitan to Tahoe available from their product page. If your Mac hasn’t yet installed this update, you can force it using SilentKnight or at the command line.
If you want to install this as a named update in SilentKnight, its label is XProtectPlistConfigData_10_15-5317
I apologise for the late announcement of this update, which seems to have been released after 22:00 GMT on 30 September, but was still incomplete here through the whole of today, 1 October.
Sequoia and Tahoe systems only
This update has already been released for Sequoia and Tahoe via iCloud. If you want to check it manually, use the Terminal command
sudo xprotect check
then enter your admin password. If that returns version 5317 but your Mac still reports an older version is installed, you should be able to force the update using
sudo xprotect update
Last Week on My Mac: Why Spotlight can’t find some files
In macOS Mojave, Apple changed the way that Spotlight indexes the contents of plain text files. That introduced a bug that prevents indexing of any of the contents of files starting with certain characters. For many Macs, that bug won't ever be fixed.
Apple has released its weekly update to XProtect, bringing it to version 5317. As usual, it doesn’t release information about what security issues this update might add or change.
This version adds five new detection signatures to its Yara file. These include another newcomer with four signatures, MACOS.DAILYDUMPLING, and MACOS.SOMA.SEEND to add to the large Amos/Soma family.
You can check whether this update has been installed by opening System Information via About This Mac, and selecting the Installations item under Software.
A full listing of security data file versions is given by SilentKnight and SystHist for El Capitan to Tahoe available from their product page. If your Mac hasn’t yet installed this update, you can force it using SilentKnight or at the command line.
If you want to install this as a named update in SilentKnight, its label is XProtectPlistConfigData_10_15-5317
I apologise for the late announcement of this update, which seems to have been released after 22:00 GMT on 30 September, but was still incomplete here through the whole of today, 1 October.
Sequoia and Tahoe systems only
This update has already been released for Sequoia and Tahoe via iCloud. If you want to check it manually, use the Terminal command
sudo xprotect check
then enter your admin password. If that returns version 5317 but your Mac still reports an older version is installed, you should be able to force the update using
sudo xprotect update
Last Week on My Mac: Why Spotlight can’t find some files
In macOS Mojave, Apple changed the way that Spotlight indexes the contents of plain text files. That introduced a bug that prevents indexing of any of the contents of files starting with certain characters. For many Macs, that bug won't ever be fixed.
Apple has released its weekly update to XProtect, bringing it to version 5317. As usual, it doesn’t release information about what security issues this update might add or change.
This version adds five new detection signatures to its Yara file. These include another newcomer with four signatures, MACOS.DAILYDUMPLING, and MACOS.SOMA.SEEND to add to the large Amos/Soma family.
You can check whether this update has been installed by opening System Information via About This Mac, and selecting the Installations item under Software.
A full listing of security data file versions is given by SilentKnight and SystHist for El Capitan to Tahoe available from their product page. If your Mac hasn’t yet installed this update, you can force it using SilentKnight or at the command line.
If you want to install this as a named update in SilentKnight, its label is XProtectPlistConfigData_10_15-5317
I apologise for the late announcement of this update, which seems to have been released after 22:00 GMT on 30 September, but was still incomplete here through the whole of today, 1 October.
Sequoia and Tahoe systems only
This update has already been released for Sequoia and Tahoe via iCloud. If you want to check it manually, use the Terminal command
sudo xprotect check
then enter your admin password. If that returns version 5317 but your Mac still reports an older version is installed, you should be able to force the update using
sudo xprotect update
Saturday Mac riddles 331
Here are this weekend’s Mac riddles to entertain you through family time, shopping and recreation. 1: A red […]
Apple has released its weekly update to XProtect, bringing it to version 5317. As usual, it doesn’t release information about what security issues this update might add or change.
This version adds five new detection signatures to its Yara file. These include another newcomer with four signatures, MACOS.DAILYDUMPLING, and MACOS.SOMA.SEEND to add to the large Amos/Soma family.
You can check whether this update has been installed by opening System Information via About This Mac, and selecting the Installations item under Software.
A full listing of security data file versions is given by SilentKnight and SystHist for El Capitan to Tahoe available from their product page. If your Mac hasn’t yet installed this update, you can force it using SilentKnight or at the command line.
If you want to install this as a named update in SilentKnight, its label is XProtectPlistConfigData_10_15-5317
I apologise for the late announcement of this update, which seems to have been released after 22:00 GMT on 30 September, but was still incomplete here through the whole of today, 1 October.
Sequoia and Tahoe systems only
This update has already been released for Sequoia and Tahoe via iCloud. If you want to check it manually, use the Terminal command
sudo xprotect check
then enter your admin password. If that returns version 5317 but your Mac still reports an older version is installed, you should be able to force the update using
sudo xprotect update
Saturday Mac riddles 331
Here are this weekend’s Mac riddles to entertain you through family time, shopping and recreation. 1: A red […]
Apple has released its weekly update to XProtect, bringing it to version 5317. As usual, it doesn’t release information about what security issues this update might add or change.
This version adds five new detection signatures to its Yara file. These include another newcomer with four signatures, MACOS.DAILYDUMPLING, and MACOS.SOMA.SEEND to add to the large Amos/Soma family.
You can check whether this update has been installed by opening System Information via About This Mac, and selecting the Installations item under Software.
A full listing of security data file versions is given by SilentKnight and SystHist for El Capitan to Tahoe available from their product page. If your Mac hasn’t yet installed this update, you can force it using SilentKnight or at the command line.
If you want to install this as a named update in SilentKnight, its label is XProtectPlistConfigData_10_15-5317
I apologise for the late announcement of this update, which seems to have been released after 22:00 GMT on 30 September, but was still incomplete here through the whole of today, 1 October.
Sequoia and Tahoe systems only
This update has already been released for Sequoia and Tahoe via iCloud. If you want to check it manually, use the Terminal command
sudo xprotect check
then enter your admin password. If that returns version 5317 but your Mac still reports an older version is installed, you should be able to force the update using
sudo xprotect update
Be careful when interpreting APFS timestamps
Two confounding factors to take into account when interpreting timestamps on files: what updates the Last opened time, and access via QuickLook.
Apple has released its weekly update to XProtect, bringing it to version 5317. As usual, it doesn’t release information about what security issues this update might add or change.
This version adds five new detection signatures to its Yara file. These include another newcomer with four signatures, MACOS.DAILYDUMPLING, and MACOS.SOMA.SEEND to add to the large Amos/Soma family.
You can check whether this update has been installed by opening System Information via About This Mac, and selecting the Installations item under Software.
A full listing of security data file versions is given by SilentKnight and SystHist for El Capitan to Tahoe available from their product page. If your Mac hasn’t yet installed this update, you can force it using SilentKnight or at the command line.
If you want to install this as a named update in SilentKnight, its label is XProtectPlistConfigData_10_15-5317
I apologise for the late announcement of this update, which seems to have been released after 22:00 GMT on 30 September, but was still incomplete here through the whole of today, 1 October.
Sequoia and Tahoe systems only
This update has already been released for Sequoia and Tahoe via iCloud. If you want to check it manually, use the Terminal command
sudo xprotect check
then enter your admin password. If that returns version 5317 but your Mac still reports an older version is installed, you should be able to force the update using
sudo xprotect update
Be careful when interpreting APFS timestamps
Two confounding factors to take into account when interpreting timestamps on files: what updates the Last opened time, and access via QuickLook.
Apple has released its weekly update to XProtect, bringing it to version 5317. As usual, it doesn’t release information about what security issues this update might add or change.
This version adds five new detection signatures to its Yara file. These include another newcomer with four signatures, MACOS.DAILYDUMPLING, and MACOS.SOMA.SEEND to add to the large Amos/Soma family.
You can check whether this update has been installed by opening System Information via About This Mac, and selecting the Installations item under Software.
A full listing of security data file versions is given by SilentKnight and SystHist for El Capitan to Tahoe available from their product page. If your Mac hasn’t yet installed this update, you can force it using SilentKnight or at the command line.
If you want to install this as a named update in SilentKnight, its label is XProtectPlistConfigData_10_15-5317
I apologise for the late announcement of this update, which seems to have been released after 22:00 GMT on 30 September, but was still incomplete here through the whole of today, 1 October.
Sequoia and Tahoe systems only
This update has already been released for Sequoia and Tahoe via iCloud. If you want to check it manually, use the Terminal command
sudo xprotect check
then enter your admin password. If that returns version 5317 but your Mac still reports an older version is installed, you should be able to force the update using
sudo xprotect update
 
    
  
             
    
  
                            
                        
                         
    
  
             
    
  
                            
                        
                         
    
  
                            
                        
                         
    
  
                            
                        
                         
    
  
                            
                        
                         
    
  
                            
                        
                         
    
  
             
    
  
               
    
  
            
