1. Trang chủ
  2. » Công Nghệ Thông Tin

Mac OS X Leopard Bible

986 427 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Mac OS X Leopard Bible
Tác giả Samuel A. Litt, Thomas Clancy, Jr., Warren Gottlieb, Douglas Heyman, Elizabeth Costa-Woods, Seth B. Zuckerman
Thể loại Sách
Năm xuất bản 2008
Định dạng
Số trang 986
Dung lượng 29,46 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

I would also like to thank my colleagues at the City of New York; Paul Cosgrave, RonaldBergaman, Michael Lebow, Michael Bimonte, Christopher Ianniello, Marcos Merced, Arick Wierson, Jona

Trang 2

Mac OS®

Bible

Samuel A Litt, Thomas Clancy, Jr., Warren Gottlieb, Douglas Heyman, Elizabeth Costa-Woods, Seth B Zuckerman

Trang 3

Mac OS®

Bible

Trang 4

For updates to this book, please visit www.wiley.com/go/leopard

Trang 5

Mac OS®

Bible

Samuel A Litt, Thomas Clancy, Jr., Warren Gottlieb, Douglas Heyman, Elizabeth Costa-Woods, Seth B Zuckerman

Trang 6

Mac OS ® X Leopard ™ Bible

Copyright © 2008 by Wiley Publishing, Inc., Indianapolis, Indiana

Published simultaneously in Canada

01923, (978) 750-8400, fax (978) 646-8600 Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317)

572-4355, or online at http://www.wiley.com/go/permissions.

LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: THE PUBLISHER AND THE AUTHOR MAKE NO

REPRESENTATIONS OR WARRANTIES WITH RESPECT TO THE ACCURACY OR COMPLETENESS OF THE CONTENTS OF THIS WORK AND SPECIFICALLY DISCLAIM ALL WARRANTIES, INCLUDING WITHOUT LIMITATION WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE NO WARRANTY MAY BE CREATED

OR EXTENDED BY SALES OR PROMOTIONAL MATERIALS THE ADVICE AND STRATEGIES CONTAINED HEREIN MAY NOT BE SUITABLE FOR EVERY SITUATION THIS WORK IS SOLD WITH THE UNDERSTANDING THAT THE PUBLISHER IS NOT ENGAGED IN RENDERING LEGAL, ACCOUNTING, OR OTHER PROFESSIONAL SERVICES IF PROFESSIONAL ASSISTANCE IS REQUIRED, THE SERVICES OF A COMPETENT PROFESSIONAL PERSON SHOULD BE SOUGHT NEITHER THE PUBLISHER NOR THE AUTHOR SHALL BE LIABLE FOR DAMAGES ARISING HEREFROM THE FACT THAT AN ORGANIZATION OR WEBSITE IS REFERRED TO IN THIS WORK AS A CITATION AND/OR A POTENTIAL SOURCE OF FURTHER INFORMATION DOES NOT MEAN THAT THE AUTHOR OR THE PUBLISHER ENDORSES THE INFORMATION THE ORGANIZATION OR WEBSITE MAY PROVIDE OR RECOMMENDATIONS IT MAY MAKE FURTHER, READERS SHOULD BE AWARE THAT INTERNET WEBSITES LISTED IN THIS WORK MAY HAVE CHANGED OR DISAPPEARED BETWEEN WHEN THIS WORK WAS WRITTEN AND WHEN IT IS READ.

For general information on our other products and services or to obtain technical support, please contact our Customer Care Department within the U.S at (800) 762-2974, outside the U.S at (317) 572-3993 or fax (317) 572-4002.

Library of Congress Control Number: 2007926396

Trademarks: Wiley, the Wiley logo, and related trade dress are trademarks or registered trademarks of John Wiley & Sons,

Inc and/or its affiliates, in the United States and other countries, and may not be used without written permission Mac OS

Trang 7

About the Authors

Samuel A Litt is an Apple Certified Technical Coordinator as well as a certified member of the

Apple Consultants Network He is a certified SonicWall security administrator, a Qlogic certifiedsystems administrator, and is certified in Xsan and Avid Unity Storage Area Networks as well Hecurrently serves as the manager of Macintosh support for the Department of InformationTechnology and Telecommunications for the City of New York His works published to date

include the Mac OS X Administration Basics Exam Cram Study Guide, the Mac OS X Bible Panther and Leopard Editions, as well as several articles for Element K’s Mac Administrator Journal and Quark’s X-RAY magazine.

Elizabeth Costa-Woods has been working with Macs for over 10 years and is an Apple certified

technical coordinator She is currently a Macintosh systems administrator for the City of New York.Before working for the City, she worked for the City Volunteer Corp., Cause Effective, and theNathan Cummings Foundation Elizabeth currently lives in New Jersey with her husband and twochildren

Thomas Clancy, Jr is one of the four co-owners of Valiant Technology Inc., a consulting and

sup-port company in New York City, along with Douglas Heyman, Gene McMurray, and Georg J.Dauterman Tom attended Queens College (CUNY) and received his bachelor’s degree in Europeanhistory and secondary education Tom currently lives in Putnam County, New York (aka Ice StationZebra) with his wife, Alice, and their two sons, Jack and Theodore Tom would like to point outthat he is not related to “the” Tom Clancy, although he is proud to be related to another TomClancy: his dad, a retired veteran of the FDNY (which is a more important job than “WorldFamous Author” no matter how you slice it, although the pay isn’t as good, sadly)

Douglas Heyman is a longtime Mac user, having cut his teeth on the venerable System 6 on an SE

with two 800K floppies and 1MB of memory Early in his career, he worked as a writer and ing editor of numerous literary projects Shifting his professional focus to one of his main loves,technology, he spent the next few years as in-house IT staff for a major New York advertisingagency He currently works as a founding partner and vice president of Valiant Technology, a NewYork-based technology solutions provider Born and raised in New Jersey, he resides in Hobokenwith his loving wife, Suzanne, and his wondrous son, Marcus

manag-Warren Gottlieb is a professional Mac IT consultant who has transformed a deeply rooted passion

and hobby into his profession He has worked with a number of the top Macintosh tech firms inNew York City, and currently works with DeepTech, Inc., home to Manhattan’s finest Mac special-ists Warren is pursuing his studies at the City University of New York’s Hunter College Despite

Trang 8

Quality Control Technician

For Lewis, Vivi, and Java for bringing me to life.

Thanks very much!

To Jack and Ted Clancy.

You are my inspiration.

—Tom “Papa” Clancy Jr.

Trang 9

Samuel A Litt: First and foremost, I would like to thank my wife Jodi, and my daughters, Peri

and Shana, for their love and devotion I would like to thank Mom and Dad for their unwaveringsupport I would also like to thank my colleagues at the City of New York; Paul Cosgrave, RonaldBergaman, Michael Lebow, Michael Bimonte, Christopher Ianniello, Marcos Merced, Arick

Wierson, Jonathon Werbell and Kevin Sheekey as well as countless others for thinking different and

providing a fertile and stimulating work environment and enabling me to do the job I would like

to thank Kevin Boland, Tommy Milanak, Gary Slobin, Ken Klein, Matt Rosencrans, and JonRubinstein for their friendship! Many, many thanks to my super smart and talented coauthors —Lisa, Warren, Tom, Doug, and Seth — without whose participation this project would be naught

A special thanks to the folks at Wiley; the Super Kim Spilker and the Mighty Marty Minner

Elizabeth Costa-Woods: I’d like to thank my husband, Lewis Woods, for caring for our children

while I chased my Mac dreams It takes a BIG man to do what you’ve done and I will never forget

it I adore you Vivianne and Tristan Woods, I am so proud to be your mother The two of you willalways be the biggest accomplishment of my life To my parental units, you’ve taught me perfectionand hard work and it’s gotten me farther than I ever dreamed I love you both very much To mysiblings, nephews, niece and godchildren, thank you for keeping me laughing I love you all To

my girls, Rosie and Chantel, thank you for keeping it real and having my back

Ed Abrahams, thank you for taking a chance on a girl perched atop a pile of coats; in one way oranother, you have been the source of every job that I have ever had Lauren Goldstein, you are aninspiration I’ll never forget you To my sister, my friend, my advocate, Zanetta Addams-Pilgrim,thank you for your contributions to my career and my life What would I do without you? To theboard and staff of the Nathan Cummings Foundation, thank you for giving me the support andresources to discover my inner-tech To Sam Litt, I’m your biggest fan You will always be my men-tor and friend

Thomas Clancy, Jr.: I would like to thank my amazing wife Alice for all the support and the

regu-lar brownie donations to my writing sessions I’d also like to thank my sons Jack and Ted for ing my bad days disappear I’d also like to acknowledge the daily contributions of every one of myteam at Valiant: (in order of seniority) Doug Heyman, Gene McMurray, Georg Dauterman, Nick

Trang 10

mak-Gene McMurray, Georg Dauterman, Nick Nightingale, Andrew Yu, Nicole Carpino, StephenZielinski, and many more I’ve surely forgotten A special thanks to Sam for continuously gettingthis book together.

Warren Gottlieb: To my twin sister Shari, who has been an unwavering force of support,

kind-ness, and patience, as I tread old ground that is at times frustratingly familiar, yet new and ent From one published author to another, thank you for your immense help! Thank you Momand Dad, for your unconditional love and attentiveness: Mom, for always making sure that I know,and for your emotional intelligence; Dad, for teaching me the fundamentals that lead to a newworld of discovery — “Remember, no matter what happens, you can never break it.” And to allthose with whom I have had the pleasure of sharing that mantra Thank you, also, to my friends —your level of support is both awesome and essential I so very much appreciate those who in myabsence pursue me, which is when I need them the most

differ-Seth B Zuckerman: I would like to thank Jackie, Manny, Maddy, Maggie, and Minnie for their

support throughout the growth of myself and my business I would like to thank David Salav,Vincent DiSpigno, Ronald Ebner, Scott Schaeffer, Matthew Tannenbaum, and Sam Litt for theirtechnical and industry guidance I would like to thank Roy Morris for his insistence on my pur-chasing my first Macintosh computer I would like to thank my friends, Kenneth Gerber, MichaelDamelio, Andrew Sitzer, the Burton’s, Anthony Chou, Mindie Schwartz, Sandra Zic, Kim Scharoff,Adam Lilling, Aly Davis, Randy Lerner, The Money Shots, and The Baby Batters Other randomthanks to Nick Manello, Birthright Israel, Irv Gordon, the Bubbamobile, Point Blank, Volvo, andanyone I have forgotten

Trang 11

About the Authors v

Acknowledgments vii

Introduction xxix

Part I: Getting to Know Mac OS X 1

Chapter 1: Introduction and Installation of Mac OS X 3

Chapter 2: Exploring the GUI and Personalizing your Workspace 19

Chapter 3: Searching with Spotlight 127

Chapter 4: Transitioning to Intel Architecture and Universal/Binary Apps 157

Chapter 5: Working with Applications and Documents 163

Chapter 6: Working with Included Applications 193

Chapter 7: Working with QuickTime and Included Media Applications 241

Part II: At Work with Mac OS X 277

Chapter 8: Getting Help 279

Chapter 9: Utilizing Services 289

Chapter 10: Getting on the Internet 303

Chapter 11: Setting Up a Local Network 363

Chapter 12: Sharing Files and Network Services 417

Chapter 13: Deploying More Network Services 453

Chapter 14: Harnessing Mac 481

Chapter 15: Managing Fonts 573

Part III: Beyond the Basics of Mac OS X 605

Chapter 16: Printing and Faxing 607

Chapter 17: Managing System Preferences 623

Chapter 18: Managing User Accounts and Privileges 679

Chapter 19: Integrating in a Windows World 715

Part IV: Making the Most of Mac OS X 739

Trang 13

About the Authors v

Acknowledgments vii

Introduction xxix

Part I: Getting to Know Mac OS X 1 Chapter 1: Introduction and Installation of Mac OS X 3

What Is Mac OS X? 3

Core Technologies of Mac OS X 4

Darwin 4

Graphics technologies in Mac OS X 5

Mac OS X’s application environments 6

Installation Considerations for Mac OS X 8

Hardware requirements of OS 10.5 8

Preparing for the installation of OS X 9

Volume preparation for OS X 9

Gathering setup information 10

Hard drive backup 10

Preparing the destination volume 10

Running the Mac OS X installer 11

Using the Setup Assistant 14

Running Software Update 16

Summary 17

Chapter 2: Exploring the GUI and Personalizing Your Workspace 19

Starting Up and Logging In 20

Starting up your computer 20

Logging in to Mac OS X 20

Meeting Your Environment 23

Trang 14

Recognizing the Desktop 29

Customizing the desktop 30

Setting the desktop background 31

Saving the Screen 32

Optimizing screen saver settings 35

Setting screen saver options 36

Peeking into Windows 38

Recognizing different window types 38

Window controls 40

Buttons and other controls 42

Working with Windows 45

New window, please 45

Active and inactive windows 45

Using the Window menu 47

Worshipping Icons 49

Identifying application icons 50

Identifying document icons 50

Identifying folder icons 50

Identifying volume icons 50

Identifying alias icons 51

Identifying restricted folders 51

Interacting with icons 52

Selecting icons 52

Moving icons 55

Replicating your files 56

Renaming files 57

Get Info 60

Locking or unlocking an item 63

Finding Out About the Finder 63

Finder-specific menus 63

Finder windows 67

Finder window views 71

Setting Finder Preferences 76

Modifying Finder windows 78

Customizing the toolbar 79

Additional toolbar buttons 80

Setting View Options 81

Setting Icon view options 82

Setting List view options 84

Setting Column view options 85

Setting Cover Flow view options 85

Using Custom Icons 85

Attaching a custom icon 86

Removing a custom icon 87

Trang 15

Setting Appearance Preferences 88

Using the Color Picker 89

Working with Folders 91

Creating folders 91

Opening folders and disks 91

Folder actions 92

Working with Disks and Other Volumes 96

Looking at drives, partitions, and volumes 96

Ejecting disks 96

Erasing volumes 97

Burning discs 97

Discovering Your Inner Hard Drive 100

Living at Home 101

Working with Aliases 102

Using aliases 102

Making an alias 103

Renaming an alias 104

Dragging items to an alias 104

Moving, copying, and deleting an alias 104

Finding an original item 104

Fixing broken aliases 104

Selecting a new original for an alias 105

Taking Out the Trash 105

Moving items to the Trash 106

Viewing and removing Trash contents 106

Emptying the Trash 106

Secure Empty Trash 107

Looking At the Dock 107

Appreciating Dock niceties 108

Identifying Dock icons 109

Customizing the Dock 109

Resizing the Dock 109

Setting the Dock position and hiding 110

Setting Dock magnification 110

Choosing a visual effect 111

Adding items to the Dock 111

Removing Dock icons 111

Moving icons in the Dock 111

Trang 16

Using Dashboard 117

Activating Dashboard 117

Available widgets 118

Activating more widgets 119

Modifying widgets 120

Spaces 120

Everything in its Space 121

Jumping from Space to Space 121

Sleeping, Shutting Down, Restarting, or Logging Out 123

Making the computer sleep (and wake up) 123

Logging out of Mac OS X 124

Restarting the computer 125

Shutting down the computer 125

Summary 126

Chapter 3: Searching with Spotlight 127

What Spotlight Can Do for You 127

Behind the Scenes with Spotlight 128

Metadata 128

The Spotlight Store 130

Supported file types 131

Using Spotlight 132

The magnifying glass in the menu bar 132

Working with your Spotlight results 134

Performing more complex searches 139

Spotlight volume indexing 149

Spotlight System Preferences 150

System-wide integration 152

Third-party utilities 154

Summary 155

Chapter 4: Transitioning to Intel Architecture and Universal/Binary Apps 157

PowerPC versus Intel 158

Migration Considerations 159

Rosetta 159

Universal applications 160

Classic caveat 161

Drive formatting issues 161

Summary 162

Chapter 5: Working with Applications and Documents 163

Working with Mac OS X Applications 163

Preinstalled applications 164

Installing applications 168

Trang 17

Opening Applications and Documents 170

Opening items from the Finder 171

Opening documents with an application 171

Mac OS X Open dialog box 171

Opening a document with another compatible application 173

Setting a new default application 174

Opening items in the Dock 176

Opening items with the Apple menu 176

Viewing items with the Finder 177

Managing Multiple Open Applications 178

Switching programs 179

Where’d it go? 180

Attending to background applications 180

Pimping Your Document’s Contents 181

Copy, Cut, and Paste 181

Drag-and-drop 182

Clipping files 184

Creating Documents 184

Creating copies of documents 184

Creating documents with stationery pads 184

Saving Documents 186

Saving a Stationery Pad 188

Moving Documents 188

Playing Well with Others 189

Quitting Applications 189

Using an application’s Quit command 189

Quitting with a pop-up Dock menu 190

Quitting by logging out, shutting down, or restarting 190

Forcing an application to quit 190

Summary 191

Chapter 6: Working with Included Applications 193

The Applications Folder 193

Address Book 194

AppleScript folder 195

Automator 196

Calculator 196

Chess 197

Trang 18

iChat 202

Image Capture 204

iSync 205

iTunes 206

Mail 207

Photo Booth 209

Preview 210

QuickTime Player 214

Safari 214

Spaces 215

Stickies 216

System Preferences 216

TextEdit 218

Time Machine 218

A Tour of Mac OS X Utilities 220

Activity Monitor 220

AirPort Utility 221

Audio MIDI Setup 222

Bluetooth file exchange 223

Boot Camp Assistant 224

ColorSync Utility 224

Console 225

DigitalColor Meter 225

Directory 225

Directory Utility 225

Disk Utility 227

Grab 230

Grapher 230

The Java folder 231

Keychain Access 232

Migration Assistant 232

Network Utility 233

ODBC Administrator 235

Podcast Capture 235

RAID Utility 236

System Profiler 236

Terminal 237

VoiceOver Utility 238

X11 239

Summary 239

Chapter 7: Working with QuickTime and Included Media Applications 241

About QuickTime 242

What’s in a movie 243

Trang 19

Playing QuickTime Movies 244

Using the QuickTime movie controller 244

Playing movies without controllers 246

Viewing with QuickTime Player 247

Saving QuickTime Movies from a Web Browser 251

Configuring and Updating QuickTime 251

QuickTime System Preferences 251

QuickTime Player Preferences 254

Watching Streaming QuickTime Media 256

Interacting with QuickTime VR Images 256

Exploring VR panoramas 257

Investigating VR objects 257

Revealing the VR controller 258

Zooming in and out 258

Interacting with hot spots 259

Making a QuickTime Slide Show 260

Basic QuickTime Movie Editing 260

Fine-tuning a selection 261

Working with selections 261

Adding a Sound Track to Your Movie 262

Adding QuickTime Text Tracks 262

Applying QuickTime Effects 262

Using iTunes 263

Playing MP3 and CD audio with iTunes 263

Working with iTunes song and album information 269

Watching iTunes visual effects 270

Using Shared Music Libraries 272

The iTunes Store 273

Album Covers and iTunes Views 274

iTunes Views 274

Front Row 275

Summary 276

Part II: At Work with Mac OS X 277 Chapter 8: Getting Help 279

Using the Help Viewer Application 279

Trang 20

Displaying Help Tags 286

Getting Command-Line Help 286

Exploring Other Avenues of Help 287

Summary 287

Chapter 9: Utilizing Services 289

About Services 289

The Finder 291

Grab 292

Mail 293

Using Stickies 295

Speech 296

Summarize 297

TextEdit 299

Other Services 300

Summary 301

Chapter 10: Getting on the Internet 303

Why You Need the Internet 303

Connecting to the Internet 304

Making the connection 307

Internet configuration via the Network Setup Assistant 309

Making and breaking the connection 316

Browsing the World Wide Web 319

Safari in the Web jungle 319

Other browsers for your toolkit 319

Taking a Safari Through the Wild Web 320

Navigation basics 320

More features, and customization 323

Advanced navigation 328

Further Safari enhancements 337

Searching the Internet 341

Sending and Receiving E-mail 343

Setting up e-mail information and preferences 343

Using Mail’s viewer window 346

Receiving e-mail 350

Composing messages 350

Using the Address Book 354

Sending e-mail attachments 357

Receiving attachments 357

Junk mail 358

Threading 360

Smart Mailboxes 360

Summary 362

Trang 21

Chapter 11: Setting Up a Local Network 363

The Networking Concept 364

Understanding a computer network 364

Understanding layered networks 364

The Physical Layer 365

Ethernet protocol 366

Making the Ethernet connection 367

The Communications Layer 371

AppleTalk 372

TCP/IP 372

The Application Layer 381

The Network Preference Pane 382

Understanding ports and locations 383

Network status display 383

Configuring the port settings 385

Configuring network ports 399

Working with network locations 402

Getting assistance 403

Other roads for help 404

AirPort 406

Installing AirPort cards 406

Creating a computer-to-computer AirPort network 407

Setting Up an AirPort Base Station 408

Setting up an AirPort Base Station 409

Bluetooth Networking 412

Settings panel 412

Sharing 413

Setting up Bluetooth devices 413

Bluetooth menu bar icon 414

Bluetooth file exchange 414

Summary 416

Chapter 12: Sharing Files and Network Services 417

Accessing Files 417

Connecting to a file server 418

Connecting to Microsoft Windows file servers 424

Connecting to an FTP server 425

Trang 22

Sharing Your Files 437Planning for file sharing 437Identifying your computer 439Turning file sharing on and off 440Identifying who can connect for file sharing 445Designating your shared items 445Setting specific access privileges 446Dealing with Security Risks 448Assessing the risks of guest access 448Assessing the risks of administrator access 448Assessing the risk of your Internet connection 448Improving file-sharing security 449Using a personal firewall to improve security 449Sharing Your Internet Connection 451Summary 452

Chapter 13: Deploying More Network Services 453

Making Network Services Available 453Your computer’s IP addresses 454Getting your computer a name 456Hosting Your Own Web Site 457Starting Web sharing 458Loading Web site files 459Visiting your Web site 462Allowing FTP Access 463Turning FTP access on or off 463Avoiding file damage 464Considering security 465Allowing anonymous guest access 467Connecting to your FTP server 467Allowing Remote Login 469Turning remote login on or off 470Connecting for remote login 471Remote Control 473Turning on Remote Control 473Controlling a computer 476Summary 480

Chapter 14: Harnessing Mac 481

About the Mac Service 481Requirements to use Mac 482Signing up for a Mac account 483Updating or upgrading your Mac membership 486Configuring Mac OS X for your Mac account using the Mac

Trang 23

Using the Mac Address Book 497Using iDisk 498HomePage 509Creating a Web page with HomePage 509Updating a Web page 513Creating another Web site 514Deleting a page or site 514.Mac Slides Publisher 516iChat AV 518Setting up iChat 519Checking the status of iChat buddies 523Reviewing Buddy List features 524Sending instant messages 525Chatting on a local network 525Video and audio chats 527Video Effects 528Have it multi-way 529Screen Sharing 529iChat Theater 530The Address Book Application 531Setting up the Address Book 532Working with Address Book contacts 534Groups 542Adding a group 543Modifying a group 543Neat group features 543iCal 544Working with calendars 544iSync and Mac Sync 555Setting Mac preferences 556Using the iSync application 558Using the Backup Application 561Backing up 561iCards 568Summary 571

Chapter 15: Managing Fonts 573

Understanding Fonts 573

Trang 24

Managing Fonts in Mac OS X 587Font Book 587The Font panel 596The Character Palette 598The Keyboard Viewer 600Third-party font management utilities 601Summary 604

Part III: Beyond the Basics of Mac OS X 605

Chapter 16: Printing and Faxing 607

Overview of Mac OS X Printing 607Configuring Page Setup 609Printing and Faxing Options 610Adding a printer 610Setting print options 612Using the Print & Fax preference pane 615Receiving a fax 616Sending a fax 617Administering Print and Modem Queues 618Maximizing OS X Printing 620Using printer shortcuts 620Pooling printer 621Summary 622

Chapter 17: Managing System Preferences 623

Using the System Preferences Application 625Opening System Preferences 625Harnessing Spotlight 626Unlocking preference settings 626Configuring CDs & DVDs Preferences 628Configuring Date & Time Preferences 629Date & Time panel 629Time Zone panel 630Clock panel 631Configuring Display Preferences 631Display panel 632Geometry panel 634Color panel 635Display Calibrator assistant 635Arrangement panel 637Configuring Energy Saver Preferences 638Sleep panel 638Options panel 639

Trang 25

Starting sleep manually 641Waking up your computer 641Configuring Ink Preferences 641Ink preference pane 642Ink window 644Configuring International Preferences 645Language panel 645Customize Sorting sheet 647Formats panel 648Input Menu panel 648Character palettes 650Configuring Keyboard and Mouse Preferences 651Keyboard panel 651Mouse and Trackpad panels 652Bluetooth panel 653Keyboard Shortcuts panel 653Configuring Parental Controls 656Adjusting the System 656Restricting Content 658Limiting Email & Chat 660Managing Time Limits 660Checking Logs 661Adding additional restricted users 662Configuring Sound Preferences 663Sound Effects panel 664Output panel 665Input panel 665Configuring Speech Preferences 665Getting a speech recognition microphone 665Configuring speech recognition 666Using the feedback window 667Looking at the Speech Commands window 669Setting the listening method 669Specifying what commands to listen for 671Specifying which microphone to use 672Specifying the spoken user interface 672Choosing a voice for Mac OS X 672Reading documents aloud 674

Trang 26

Chapter 18: Managing User Accounts and Privileges 679

Mac OS X and Privileges 679Identifying Types of User Accounts 680Root 680Administrator (admin) 680User 681Groups 681Configuring Account Preferences 682Password panel 684Login Items panel 691Login Options panel 692Advanced Options 695Workgroup Manager 696Managing Accounts via Parental Controls 697System 698Content filter 699Mail and iChat 702Time Limits 704Logs 705Easier parental management 706Administering Privileges Using Show Info 708Editing folder permissions 709Summary 712

Chapter 19: Integrating in a Windows World 715

Using Microsoft Windows on the Mac 715Boot Camp 715Virtualization 717Sharing Resources with PCs 725Connecting to a PC’s sharepoint from your Mac 725Connecting to a Mac sharepoint from a PC 728Introducing Windows Domain Architecture 733Configuring the PC servers 734Configuring the Mac 735Introducing third-party apps that help 735Revealing Other Considerations 736File naming problems 736Conversions Plus and MacLinkPlus 737Font issues 737Summary 737

Trang 27

Part IV: Making the Most of Mac OS X 739

Chapter 20: Enhancing with Utilities 741

Finding Utility Software 741Trying Out Shareware and Freeware 742Using shareware and freeware 744Getting support for shareware and freeware 744List of Mac OS X Utilities 744Airfoil and Audio Hijack 745Back Up User Prefs 745BatChmod 746Carbon Copy Cloner/SuperDuper! 746Cocktail 747coconutBattery and coconutWiFi 747CronniX 748DragThing 748Drop Drawers X 748GeekTool 748GraphicConverter X 748Haxies 749Logorrhea (and Chax) 749MacTracker 750MoRU and Spotless 750NetNewsWire and Vienna 751Neo Office/Open Office 752Renicer 752Pseudo 753QuickImageCM 753QuicKeys X2 754Salling Clicker 754SharePoints 754SideTrack 754Snapz Pro X 2 755StuffIt (Standard/Deluxe) 755SubEthaEdit 755Timbuktu/Apple Remote Desktop/VNC 755TinkerTool/OnyX 756

Trang 28

Chapter 21: Maintaining Mac OS X 759

Exploring the Mac OS X Library Folders 759Managing the main Library folder 760Exploring your personal Library folder 762Practicing Good Housekeeping 764Backups 764Maintaining the file system 769Invisible files and folders 770Protecting against viruses 771Keeping software up-to-date 774Maintenance measures 776Scheduling Maintenance 777Maximizing System Performance 778Memory problems 778Insufficient drive space 778Summary 779

Chapter 22: Automating and AppleScript 781

Understanding Messages and Events 782Introducing AppleScript 783AppleScript language 783Scripting additions 784Introducing Script Editor 785Scriptable applications and environments 785Looking at a script window 785Creating a Simple Script 787Analyzing a Script 788Learning application commands and objects 789Inspecting a dictionary 790Saving a Script 791Looking at Script File Formats 791Creating a More Complex Script 792Making a Finder utility 793Beginning the script 793Seeing the script’s results 793Using variables 794Capitalizing script statements 795Getting file information 795Using parentheses 796Working with an application 796Performing script statements conditionally 797Breaking long statements 798Ending the use of an application 799Trying out your script 799

Trang 29

Creating a Drag-and-Drop Script Application 800Retrieving dropped files 801Processing dropped files 801Using a repeat loop 802Extending the script 803Borrowing Scripts 803Running Scripts 804Linking Programs 804Allowing remote Apple events 805Scripting across a network 805AppleScript Studio 807Automating with Automator 807Recording actions 812Summary 813

Chapter 23: Commanding Unix 815

Introduction to Unix 816CLI in a GUI world 816The Terminal 817The Shell 819Some common special characters 820Scripting the shell 820Basic Unix Commands 821Unix command syntax 821The man pages 822Logging in and logging out 823Managing files and directories 825Disk and file system statistics 832Viewing and Editing Files 834Standard input, standard output, and pipes 834Learning permissions 837Advanced Unix Topics 840Environment and shell variables 840Manipulating text file contents 842Writing shell scripts 844Making Use of Unix 845What Can I Do with Unix? 845Installing Additional Software 846

Trang 30

Wget 856GIMP 858CinePaint (filmGimp) 865Where to Find More Information 865Summary 866

Chapter 24: Securing Mac OS X 867

Introduction to Unix Security 867What Is a Vulnerability? 868Classifications of vulnerabilities 868Keeping aware of vulnerabilities 868Thinking Securely 869Physical Security 870Setting an Open Firmware password 871Using the Security preference pane 872Enabling FileVault protection 872Using Secure Empty Trash 873Viruses 874Understanding the difference between carrier and infected 874Antivirus software 875Network Security 875Understanding TCP/IP 876Understanding network security threats 876Services 878Port usage 878Principle of least privilege 879Monitoring open ports 879Using a graphical interface to check open ports 880Built-in Firewall 881Inspecting firewall rulesets using Terminal 881Implementing firewall rulesets using Sharing preferences 881Protecting Yourself from System Bugs 882Apple Software Update 882Third-party software updates 883System Logs 883Introducing Syslog 883Configuring Syslog to separate interesting messages 884Viewing system logs 885Using Terminal to view log files 886Using the Console application to view log files 887Summary 887

Glossary 889

Trang 31

According to popular legend, a Mac is so easy to use that you don’t need to read books about

it Alas, if only that were true The fact is that harnessing all the power of Mac OS X wouldtake a substantial amount of time of exploring and tinkering, and not everyone has thetime, the inclination, or the patience to devote to the mastery of an operating system Save yourtime for having fun with games, surfing the Internet, or perhaps getting some work done Benefitfrom the experience of others (in this case, we the authors)! Read this book so that you can lever-age the full power of OS X without a lot of ambling around the desktop

You might be under the impression that you don’t need this book because of Apple’s supplied Mac

OS X Getting Started Guide and on-screen help Though these are good sources of information, the

Mac OS X Leopard Bible contains a great deal of information and how-to guidance that you won’t

find anywhere else

Trang 35

From the moment you see Mac OS X, you know that it’s different from

any other computer operating system on the planet, including earlieriterations of Mac OS Nothing else looks quite like it Yet, use it a bitand you’ll see that there is familiarity about its operation Apple has made

great efforts to ensure that Macintosh users as well as Windows users can

leverage their previous OS skill sets But what sets Mac OS X apart from its

predecessors and its competition is the sum total of its parts

This chapter provides an overview of the core technologies that comprise

Mac OS X Knowing the core technologies can help you master the overall

operation of this world-class operating system The chapter concludes by

examining the system requirements of Mac OS X and its installation

What Is Mac OS X?

Mac OS X is Apple’s answer to the quest for a modern operating system It

combines the power and stability of Unix with the simplicity of Macintosh

In 1996, after continual failed attempts to develop its own next-generation

operating system, Apple management looked outside the company and

acquired NeXT Software, Inc NeXT’s OS at the time was called OpenStep

It had all the features that Apple desired in a modern OS: protected memory,

IN THIS CHAPTERWhat is Mac OS X?

Understanding the core technologies of Mac OS X Reviewing the installation process

Installing Mac OS X Running the Setup Assistant Running Software Update

Introduction and Installation

of Mac OS X

Trang 36

Mac OS 10.5 is another evolutionary step in the OS X product line Apple claims it has more than

300 enhancements One of the more significant enhancements, though most likely unperceivable

to most users, is that the product is now a 64-bit Universal OS that is capable of running 32-bitsoftware without recompilation What does this mean in layman’s terms? Mac OS X 10.5 can beinstalled on both Intel and PowerPC CPU-based Macs and will continue to run your existing Mac

OS X application

Mac OS X is capable of addressing up to a whopping 16 exabytes of virtual memory

An exabyte is equivalent to 1,024 petabytes, and a petabyte is equivalent to 1,024 terabytes — that’s a lot of memory.

Core Technologies of Mac OS X

The most important thing to know about Mac OS X is that it is based on open standards This isbecause at the heart of OS X is Unix, which has played a major role in the development of theInternet Because Unix is so Internet-centric, OS X can be integrated in virtually any computingenvironment In fact, the X in Mac OS X represents the X in Unix But fear not; although Mac OS X

is a Unix operating system, its operation does not require the mastery of complex Unix commandsyntax As Apple publicizes, the command line is there for those who would like to use it, but itisn’t required for day-to-day operations You can make as much or as little use of it as you want

If OS X were compared to an automobile, you would see a similarity in that both are composed

of many parts All these parts have very distinct functions, and yet all make up a greater whole.Metaphorically speaking, the intention of Apple was to design a vehicle akin to a Formula 1 racingcar When the engineers at Apple set out to build OS X, they pulled together world-class technolo-gies in an effort to build the most advanced consumer operating system the world has ever seen.The following sections take a closer look at these parts

Mach microkernel

At the center of Darwin is the Mach microkernel based on FreeBSD 5.x, the foundation that vides basic services for all other parts of the operating system Mach was developed at Carnegie-Mellon University, and its history is closely tied with BSD Unix (Berkeley Software Distribution)

pro-It is Mach that gives OS X the features of protected memory architecture, preemptive multitasking,and symmetric multiprocessing

NOTE

Trang 37

Protected memory

Protected memory isolates applications in their own individual memory workspaces When anapplication crashes, the program can be terminated without having a negative effect on other running applications or requiring a restart of the computer

Advance memory management

Advance memory management automatically manages physical RAM and virtual memory cally as needed Virtual memory uses hard disk space in lieu of physical RAM Information thatwould normally sit in RAM, but is not currently needed, is transferred to the hard disk to free upphysical RAM for the demands of data/applications that need it This alleviates out-of-memory con-ditions and eliminates the need, experienced by users of previous Macintosh desktop operatingsystems, of having to manually adjust memory allocations

dynami-Preemptive multitasking

Mac OS X, like all Mac OS versions since System 7, allows more than one application to be open

and operating at the same time This capability is known as multitasking Prior to OS X, the Mac OS employed a version of multitasking referred to as cooperative multitasking In cooperative multitask-

ing, applications sometimes seemed unresponsive because the system software could not efficientlymanage the concurrent demands of multiple running programs Mac OS X remedies this by imple-

menting preemptive multitasking Preemptive multitasking prioritizes processor tasks by order

of importance This more efficient method of managing processor tasks allows the computer toremain responsive, even during the most processor-intensive tasks

Symmetric multiprocessing

Symmetric multiprocessing (SMP) provides support for multiprocessor Macintosh computer tems This allows applications to take advantage of two or more processors by assigning applications

sys-to specific processors or by splitting parts of applications, known as threads, between multiple

processors simultaneously Mac OS X is further optimized to take advantage of SMP by employing

a technique known as optimized kernel resource locking Optimized kernel resource locking provides

superior SMP performance by allowing multiple CPUs access to different portions of the kernelsimultaneously Mac OS 10.5 takes multiprocessing another step forward with its multicore proces-sor competency, allowing it to harness the power of up to eight cores simultaneously, which is themaximum number of cores shipping inside of Macintosh computers at the time of this writing

Graphics technologies in Mac OS X

Trang 38

by reducing floating-point unit (FPU) CPU utilization by offloading it to the Graphic ProcessingUnit (GPU) of the video hardware Not all video cards are Core Image/Animation capable, but it’ssafe to assume that if your Mac has shipped within the last two years, it will be either fully or par-tially compliant, because the technology is scaling and is dependent upon hardware capabilities.For a complete list of Core Image/Animation-compliant video cards, visit www.apple.com.

OpenGL

Open Graphics Library (OpenGL) started out as a technology initiative by Silicon Graphics, Inc.,

a manufacturer of high-end graphics workstations It has since become an industry standard forthree-dimensional (3-D) graphics rendering It provides a standard graphics application program-ming interface (API) by which software and hardware manufacturers can build 3-D applicationsand hardware across multiple platforms on a common standard OpenGL is very prevalent in gam-ing, computer-aided design (CAD), professional 3-D animation/modeling, and graphic design

QuickTime

QuickTime is Apple’s cross-platform multimedia authoring and distribution engine It’s both a fileformat and a suite of applications QuickTime has been around since 1991 and has matured into avery powerful technology It supports more than 50 media file formats encompassing audio, video,and still images Some examples of these file formats include AIFF, AVI, JPEG, MIDI, MP3, MPEG-1,PICT, and TIFF QuickTime has support for real-time video streaming, allowing viewers to tune in

to live or prerecorded content on demand

Aqua

Though Aqua is not a graphics technology in Mac OS X, it is its graphical user interface (GUI).Appearance-wise, it is a dramatic departure from OS 9’s Platinum interface, although it retains cer-tain common elements This allows for greater familiarity for legacy Macintosh operators, thusmaking the transition to OS X a more intuitive experience

Mac OS X’s application environments

Application environments allow Mac OS X to run its modern OS-enabled applications while taneously supporting legacy Mac OS software An application environment consists of various sys-tem resources, components, and services that allow an application to function Mac OS X has fiveapplication environments: Cocoa, Carbon, Java, BSD, and Classic

Trang 39

Cocoa applications are specifically developed for Mac OS X Cocoa applications are incompatiblewith older Macintosh operating systems and, therefore, do not run on Mac OS 9 Cocoa applicationstake advantage of all of Mac OS X’s modern OS features, such as advance memory management,preemptive multitasking, symmetric multiprocessing, and the Aqua interface Apple evangelizesCocoa for its modern object-oriented programming techniques and rapid application developmenttools, which make application development significantly faster and easier than for Carbon Someexamples of Cocoa applications are OS X’s Mail and Preview applications as well as Netopia’sTimbuktu for Mac OS X

Carbon

The greatest advantage of the Carbon application environment is that developers can build tions that run in either Mac OS 9 or OS X When running within OS X, Carbon applications takeadvantage of most of OS X’s modern OS features, including the Aqua interface In order for Carbonapplications to run within Mac OS 9, the CarbonLib library must be present within the Extensionsfolder within the Mac OS 9 System folder Ironically, some Carbon applications do not run underMac OS 9 The most prominent is Microsoft’s Office Version X for Mac

applica-Java

The Mac OS X Java environment is Java 2 Standard Edition-compliant It can run both Java cations and applets The key advantage of Java development is that Java applications can run onany platform that contains a cross-compatible Java Virtual Machine

Packages and bundles

A package, sometimes referred to as a bundle, is a single-icon, point-and-click representation of an

application Mac OS X’s Carbon and Cocoa applications can be comprised of multiple subordinatefiles and resources In the GUI, all of these subordinate pieces are neatly wrapped up into a repre-sentation of a single executable file for the end user To view the contents of an application package,simply press and hold the Control key while highlighting the Carbon or Cocoa application icon

Trang 40

FIGURE 1.1

When pondering packages remember the whole is greater than the sum of its parts

Installation Considerations for Mac OS X

Now that we have reviewed the core technologies of Mac OS X, let’s focus on its installation process.Although Mac OS X has a very structured installation process, several variations of installation areavailable The user’s needs dictate the appropriate installation strategy However, before any Mac

OS X implementation can take place, it is necessary to evaluate the target computer to see whether

it meets Apple’s official hardware requirements

Hardware requirements of OS 10.5

Apple’s minimum hardware requirements for Mac OS X 10.5 is a factory-shipped Intel or PowerPCG4 867MHz processor with 512MB of RAM (1GB with Developers Tools), 9GB of available harddrive space (12GB with Developers Tools), a DVD drive, a built-in FireWire port, and an Apple-supplied video option In addition, Boot Camp requires an Intel processor and will run eitherWindows XP Service Pack 2 or Windows Vista (BYOOS — bring your own OS) Photo Boothrequires an iSight camera (built-in or external), USB video class (UVC) camera, or FireWire DVcamcorder, and an Intel or PowerPC G5 processor Backdrop effects require an Intel Core Duo orfaster processor Backdrop effects when using a DV camcorder require fixed focus, exposure, andwhite balance iChat Video requires an iSight camera (built-in or external), a USB video class(UVC) camera or FireWire DV camcorder; and a 128-Kbps upstream and downstream Internetconnection Audio chats require a microphone and a 56-Kbps Internet connection Front Row,

Ngày đăng: 23/10/2013, 20:15

TỪ KHÓA LIÊN QUAN

w