I would also like to thank my colleagues at the City of New York; Paul Cosgrave, RonaldBergaman, Michael Lebow, Michael Bimonte, Christopher Ianniello, Marcos Merced, Arick Wierson, Jona
Trang 2Mac OS®
Bible
Samuel A Litt, Thomas Clancy, Jr., Warren Gottlieb, Douglas Heyman, Elizabeth Costa-Woods, Seth B Zuckerman
Trang 3Mac OS®
Bible
Trang 4For updates to this book, please visit www.wiley.com/go/leopard
Trang 5Mac OS®
Bible
Samuel A Litt, Thomas Clancy, Jr., Warren Gottlieb, Douglas Heyman, Elizabeth Costa-Woods, Seth B Zuckerman
Trang 6Mac OS ® X Leopard ™ Bible
Copyright © 2008 by Wiley Publishing, Inc., Indianapolis, Indiana
Published simultaneously in Canada
01923, (978) 750-8400, fax (978) 646-8600 Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317)
572-4355, or online at http://www.wiley.com/go/permissions.
LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: THE PUBLISHER AND THE AUTHOR MAKE NO
REPRESENTATIONS OR WARRANTIES WITH RESPECT TO THE ACCURACY OR COMPLETENESS OF THE CONTENTS OF THIS WORK AND SPECIFICALLY DISCLAIM ALL WARRANTIES, INCLUDING WITHOUT LIMITATION WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE NO WARRANTY MAY BE CREATED
OR EXTENDED BY SALES OR PROMOTIONAL MATERIALS THE ADVICE AND STRATEGIES CONTAINED HEREIN MAY NOT BE SUITABLE FOR EVERY SITUATION THIS WORK IS SOLD WITH THE UNDERSTANDING THAT THE PUBLISHER IS NOT ENGAGED IN RENDERING LEGAL, ACCOUNTING, OR OTHER PROFESSIONAL SERVICES IF PROFESSIONAL ASSISTANCE IS REQUIRED, THE SERVICES OF A COMPETENT PROFESSIONAL PERSON SHOULD BE SOUGHT NEITHER THE PUBLISHER NOR THE AUTHOR SHALL BE LIABLE FOR DAMAGES ARISING HEREFROM THE FACT THAT AN ORGANIZATION OR WEBSITE IS REFERRED TO IN THIS WORK AS A CITATION AND/OR A POTENTIAL SOURCE OF FURTHER INFORMATION DOES NOT MEAN THAT THE AUTHOR OR THE PUBLISHER ENDORSES THE INFORMATION THE ORGANIZATION OR WEBSITE MAY PROVIDE OR RECOMMENDATIONS IT MAY MAKE FURTHER, READERS SHOULD BE AWARE THAT INTERNET WEBSITES LISTED IN THIS WORK MAY HAVE CHANGED OR DISAPPEARED BETWEEN WHEN THIS WORK WAS WRITTEN AND WHEN IT IS READ.
For general information on our other products and services or to obtain technical support, please contact our Customer Care Department within the U.S at (800) 762-2974, outside the U.S at (317) 572-3993 or fax (317) 572-4002.
Library of Congress Control Number: 2007926396
Trademarks: Wiley, the Wiley logo, and related trade dress are trademarks or registered trademarks of John Wiley & Sons,
Inc and/or its affiliates, in the United States and other countries, and may not be used without written permission Mac OS
Trang 7About the Authors
Samuel A Litt is an Apple Certified Technical Coordinator as well as a certified member of the
Apple Consultants Network He is a certified SonicWall security administrator, a Qlogic certifiedsystems administrator, and is certified in Xsan and Avid Unity Storage Area Networks as well Hecurrently serves as the manager of Macintosh support for the Department of InformationTechnology and Telecommunications for the City of New York His works published to date
include the Mac OS X Administration Basics Exam Cram Study Guide, the Mac OS X Bible Panther and Leopard Editions, as well as several articles for Element K’s Mac Administrator Journal and Quark’s X-RAY magazine.
Elizabeth Costa-Woods has been working with Macs for over 10 years and is an Apple certified
technical coordinator She is currently a Macintosh systems administrator for the City of New York.Before working for the City, she worked for the City Volunteer Corp., Cause Effective, and theNathan Cummings Foundation Elizabeth currently lives in New Jersey with her husband and twochildren
Thomas Clancy, Jr is one of the four co-owners of Valiant Technology Inc., a consulting and
sup-port company in New York City, along with Douglas Heyman, Gene McMurray, and Georg J.Dauterman Tom attended Queens College (CUNY) and received his bachelor’s degree in Europeanhistory and secondary education Tom currently lives in Putnam County, New York (aka Ice StationZebra) with his wife, Alice, and their two sons, Jack and Theodore Tom would like to point outthat he is not related to “the” Tom Clancy, although he is proud to be related to another TomClancy: his dad, a retired veteran of the FDNY (which is a more important job than “WorldFamous Author” no matter how you slice it, although the pay isn’t as good, sadly)
Douglas Heyman is a longtime Mac user, having cut his teeth on the venerable System 6 on an SE
with two 800K floppies and 1MB of memory Early in his career, he worked as a writer and ing editor of numerous literary projects Shifting his professional focus to one of his main loves,technology, he spent the next few years as in-house IT staff for a major New York advertisingagency He currently works as a founding partner and vice president of Valiant Technology, a NewYork-based technology solutions provider Born and raised in New Jersey, he resides in Hobokenwith his loving wife, Suzanne, and his wondrous son, Marcus
manag-Warren Gottlieb is a professional Mac IT consultant who has transformed a deeply rooted passion
and hobby into his profession He has worked with a number of the top Macintosh tech firms inNew York City, and currently works with DeepTech, Inc., home to Manhattan’s finest Mac special-ists Warren is pursuing his studies at the City University of New York’s Hunter College Despite
Trang 8Quality Control Technician
For Lewis, Vivi, and Java for bringing me to life.
Thanks very much!
To Jack and Ted Clancy.
You are my inspiration.
—Tom “Papa” Clancy Jr.
Trang 9Samuel A Litt: First and foremost, I would like to thank my wife Jodi, and my daughters, Peri
and Shana, for their love and devotion I would like to thank Mom and Dad for their unwaveringsupport I would also like to thank my colleagues at the City of New York; Paul Cosgrave, RonaldBergaman, Michael Lebow, Michael Bimonte, Christopher Ianniello, Marcos Merced, Arick
Wierson, Jonathon Werbell and Kevin Sheekey as well as countless others for thinking different and
providing a fertile and stimulating work environment and enabling me to do the job I would like
to thank Kevin Boland, Tommy Milanak, Gary Slobin, Ken Klein, Matt Rosencrans, and JonRubinstein for their friendship! Many, many thanks to my super smart and talented coauthors —Lisa, Warren, Tom, Doug, and Seth — without whose participation this project would be naught
A special thanks to the folks at Wiley; the Super Kim Spilker and the Mighty Marty Minner
Elizabeth Costa-Woods: I’d like to thank my husband, Lewis Woods, for caring for our children
while I chased my Mac dreams It takes a BIG man to do what you’ve done and I will never forget
it I adore you Vivianne and Tristan Woods, I am so proud to be your mother The two of you willalways be the biggest accomplishment of my life To my parental units, you’ve taught me perfectionand hard work and it’s gotten me farther than I ever dreamed I love you both very much To mysiblings, nephews, niece and godchildren, thank you for keeping me laughing I love you all To
my girls, Rosie and Chantel, thank you for keeping it real and having my back
Ed Abrahams, thank you for taking a chance on a girl perched atop a pile of coats; in one way oranother, you have been the source of every job that I have ever had Lauren Goldstein, you are aninspiration I’ll never forget you To my sister, my friend, my advocate, Zanetta Addams-Pilgrim,thank you for your contributions to my career and my life What would I do without you? To theboard and staff of the Nathan Cummings Foundation, thank you for giving me the support andresources to discover my inner-tech To Sam Litt, I’m your biggest fan You will always be my men-tor and friend
Thomas Clancy, Jr.: I would like to thank my amazing wife Alice for all the support and the
regu-lar brownie donations to my writing sessions I’d also like to thank my sons Jack and Ted for ing my bad days disappear I’d also like to acknowledge the daily contributions of every one of myteam at Valiant: (in order of seniority) Doug Heyman, Gene McMurray, Georg Dauterman, Nick
Trang 10mak-Gene McMurray, Georg Dauterman, Nick Nightingale, Andrew Yu, Nicole Carpino, StephenZielinski, and many more I’ve surely forgotten A special thanks to Sam for continuously gettingthis book together.
Warren Gottlieb: To my twin sister Shari, who has been an unwavering force of support,
kind-ness, and patience, as I tread old ground that is at times frustratingly familiar, yet new and ent From one published author to another, thank you for your immense help! Thank you Momand Dad, for your unconditional love and attentiveness: Mom, for always making sure that I know,and for your emotional intelligence; Dad, for teaching me the fundamentals that lead to a newworld of discovery — “Remember, no matter what happens, you can never break it.” And to allthose with whom I have had the pleasure of sharing that mantra Thank you, also, to my friends —your level of support is both awesome and essential I so very much appreciate those who in myabsence pursue me, which is when I need them the most
differ-Seth B Zuckerman: I would like to thank Jackie, Manny, Maddy, Maggie, and Minnie for their
support throughout the growth of myself and my business I would like to thank David Salav,Vincent DiSpigno, Ronald Ebner, Scott Schaeffer, Matthew Tannenbaum, and Sam Litt for theirtechnical and industry guidance I would like to thank Roy Morris for his insistence on my pur-chasing my first Macintosh computer I would like to thank my friends, Kenneth Gerber, MichaelDamelio, Andrew Sitzer, the Burton’s, Anthony Chou, Mindie Schwartz, Sandra Zic, Kim Scharoff,Adam Lilling, Aly Davis, Randy Lerner, The Money Shots, and The Baby Batters Other randomthanks to Nick Manello, Birthright Israel, Irv Gordon, the Bubbamobile, Point Blank, Volvo, andanyone I have forgotten
Trang 11About the Authors v
Acknowledgments vii
Introduction xxix
Part I: Getting to Know Mac OS X 1
Chapter 1: Introduction and Installation of Mac OS X 3
Chapter 2: Exploring the GUI and Personalizing your Workspace 19
Chapter 3: Searching with Spotlight 127
Chapter 4: Transitioning to Intel Architecture and Universal/Binary Apps 157
Chapter 5: Working with Applications and Documents 163
Chapter 6: Working with Included Applications 193
Chapter 7: Working with QuickTime and Included Media Applications 241
Part II: At Work with Mac OS X 277
Chapter 8: Getting Help 279
Chapter 9: Utilizing Services 289
Chapter 10: Getting on the Internet 303
Chapter 11: Setting Up a Local Network 363
Chapter 12: Sharing Files and Network Services 417
Chapter 13: Deploying More Network Services 453
Chapter 14: Harnessing Mac 481
Chapter 15: Managing Fonts 573
Part III: Beyond the Basics of Mac OS X 605
Chapter 16: Printing and Faxing 607
Chapter 17: Managing System Preferences 623
Chapter 18: Managing User Accounts and Privileges 679
Chapter 19: Integrating in a Windows World 715
Part IV: Making the Most of Mac OS X 739
Trang 13About the Authors v
Acknowledgments vii
Introduction xxix
Part I: Getting to Know Mac OS X 1 Chapter 1: Introduction and Installation of Mac OS X 3
What Is Mac OS X? 3
Core Technologies of Mac OS X 4
Darwin 4
Graphics technologies in Mac OS X 5
Mac OS X’s application environments 6
Installation Considerations for Mac OS X 8
Hardware requirements of OS 10.5 8
Preparing for the installation of OS X 9
Volume preparation for OS X 9
Gathering setup information 10
Hard drive backup 10
Preparing the destination volume 10
Running the Mac OS X installer 11
Using the Setup Assistant 14
Running Software Update 16
Summary 17
Chapter 2: Exploring the GUI and Personalizing Your Workspace 19
Starting Up and Logging In 20
Starting up your computer 20
Logging in to Mac OS X 20
Meeting Your Environment 23
Trang 14Recognizing the Desktop 29
Customizing the desktop 30
Setting the desktop background 31
Saving the Screen 32
Optimizing screen saver settings 35
Setting screen saver options 36
Peeking into Windows 38
Recognizing different window types 38
Window controls 40
Buttons and other controls 42
Working with Windows 45
New window, please 45
Active and inactive windows 45
Using the Window menu 47
Worshipping Icons 49
Identifying application icons 50
Identifying document icons 50
Identifying folder icons 50
Identifying volume icons 50
Identifying alias icons 51
Identifying restricted folders 51
Interacting with icons 52
Selecting icons 52
Moving icons 55
Replicating your files 56
Renaming files 57
Get Info 60
Locking or unlocking an item 63
Finding Out About the Finder 63
Finder-specific menus 63
Finder windows 67
Finder window views 71
Setting Finder Preferences 76
Modifying Finder windows 78
Customizing the toolbar 79
Additional toolbar buttons 80
Setting View Options 81
Setting Icon view options 82
Setting List view options 84
Setting Column view options 85
Setting Cover Flow view options 85
Using Custom Icons 85
Attaching a custom icon 86
Removing a custom icon 87
Trang 15Setting Appearance Preferences 88
Using the Color Picker 89
Working with Folders 91
Creating folders 91
Opening folders and disks 91
Folder actions 92
Working with Disks and Other Volumes 96
Looking at drives, partitions, and volumes 96
Ejecting disks 96
Erasing volumes 97
Burning discs 97
Discovering Your Inner Hard Drive 100
Living at Home 101
Working with Aliases 102
Using aliases 102
Making an alias 103
Renaming an alias 104
Dragging items to an alias 104
Moving, copying, and deleting an alias 104
Finding an original item 104
Fixing broken aliases 104
Selecting a new original for an alias 105
Taking Out the Trash 105
Moving items to the Trash 106
Viewing and removing Trash contents 106
Emptying the Trash 106
Secure Empty Trash 107
Looking At the Dock 107
Appreciating Dock niceties 108
Identifying Dock icons 109
Customizing the Dock 109
Resizing the Dock 109
Setting the Dock position and hiding 110
Setting Dock magnification 110
Choosing a visual effect 111
Adding items to the Dock 111
Removing Dock icons 111
Moving icons in the Dock 111
Trang 16Using Dashboard 117
Activating Dashboard 117
Available widgets 118
Activating more widgets 119
Modifying widgets 120
Spaces 120
Everything in its Space 121
Jumping from Space to Space 121
Sleeping, Shutting Down, Restarting, or Logging Out 123
Making the computer sleep (and wake up) 123
Logging out of Mac OS X 124
Restarting the computer 125
Shutting down the computer 125
Summary 126
Chapter 3: Searching with Spotlight 127
What Spotlight Can Do for You 127
Behind the Scenes with Spotlight 128
Metadata 128
The Spotlight Store 130
Supported file types 131
Using Spotlight 132
The magnifying glass in the menu bar 132
Working with your Spotlight results 134
Performing more complex searches 139
Spotlight volume indexing 149
Spotlight System Preferences 150
System-wide integration 152
Third-party utilities 154
Summary 155
Chapter 4: Transitioning to Intel Architecture and Universal/Binary Apps 157
PowerPC versus Intel 158
Migration Considerations 159
Rosetta 159
Universal applications 160
Classic caveat 161
Drive formatting issues 161
Summary 162
Chapter 5: Working with Applications and Documents 163
Working with Mac OS X Applications 163
Preinstalled applications 164
Installing applications 168
Trang 17Opening Applications and Documents 170
Opening items from the Finder 171
Opening documents with an application 171
Mac OS X Open dialog box 171
Opening a document with another compatible application 173
Setting a new default application 174
Opening items in the Dock 176
Opening items with the Apple menu 176
Viewing items with the Finder 177
Managing Multiple Open Applications 178
Switching programs 179
Where’d it go? 180
Attending to background applications 180
Pimping Your Document’s Contents 181
Copy, Cut, and Paste 181
Drag-and-drop 182
Clipping files 184
Creating Documents 184
Creating copies of documents 184
Creating documents with stationery pads 184
Saving Documents 186
Saving a Stationery Pad 188
Moving Documents 188
Playing Well with Others 189
Quitting Applications 189
Using an application’s Quit command 189
Quitting with a pop-up Dock menu 190
Quitting by logging out, shutting down, or restarting 190
Forcing an application to quit 190
Summary 191
Chapter 6: Working with Included Applications 193
The Applications Folder 193
Address Book 194
AppleScript folder 195
Automator 196
Calculator 196
Chess 197
Trang 18iChat 202
Image Capture 204
iSync 205
iTunes 206
Mail 207
Photo Booth 209
Preview 210
QuickTime Player 214
Safari 214
Spaces 215
Stickies 216
System Preferences 216
TextEdit 218
Time Machine 218
A Tour of Mac OS X Utilities 220
Activity Monitor 220
AirPort Utility 221
Audio MIDI Setup 222
Bluetooth file exchange 223
Boot Camp Assistant 224
ColorSync Utility 224
Console 225
DigitalColor Meter 225
Directory 225
Directory Utility 225
Disk Utility 227
Grab 230
Grapher 230
The Java folder 231
Keychain Access 232
Migration Assistant 232
Network Utility 233
ODBC Administrator 235
Podcast Capture 235
RAID Utility 236
System Profiler 236
Terminal 237
VoiceOver Utility 238
X11 239
Summary 239
Chapter 7: Working with QuickTime and Included Media Applications 241
About QuickTime 242
What’s in a movie 243
Trang 19Playing QuickTime Movies 244
Using the QuickTime movie controller 244
Playing movies without controllers 246
Viewing with QuickTime Player 247
Saving QuickTime Movies from a Web Browser 251
Configuring and Updating QuickTime 251
QuickTime System Preferences 251
QuickTime Player Preferences 254
Watching Streaming QuickTime Media 256
Interacting with QuickTime VR Images 256
Exploring VR panoramas 257
Investigating VR objects 257
Revealing the VR controller 258
Zooming in and out 258
Interacting with hot spots 259
Making a QuickTime Slide Show 260
Basic QuickTime Movie Editing 260
Fine-tuning a selection 261
Working with selections 261
Adding a Sound Track to Your Movie 262
Adding QuickTime Text Tracks 262
Applying QuickTime Effects 262
Using iTunes 263
Playing MP3 and CD audio with iTunes 263
Working with iTunes song and album information 269
Watching iTunes visual effects 270
Using Shared Music Libraries 272
The iTunes Store 273
Album Covers and iTunes Views 274
iTunes Views 274
Front Row 275
Summary 276
Part II: At Work with Mac OS X 277 Chapter 8: Getting Help 279
Using the Help Viewer Application 279
Trang 20Displaying Help Tags 286
Getting Command-Line Help 286
Exploring Other Avenues of Help 287
Summary 287
Chapter 9: Utilizing Services 289
About Services 289
The Finder 291
Grab 292
Mail 293
Using Stickies 295
Speech 296
Summarize 297
TextEdit 299
Other Services 300
Summary 301
Chapter 10: Getting on the Internet 303
Why You Need the Internet 303
Connecting to the Internet 304
Making the connection 307
Internet configuration via the Network Setup Assistant 309
Making and breaking the connection 316
Browsing the World Wide Web 319
Safari in the Web jungle 319
Other browsers for your toolkit 319
Taking a Safari Through the Wild Web 320
Navigation basics 320
More features, and customization 323
Advanced navigation 328
Further Safari enhancements 337
Searching the Internet 341
Sending and Receiving E-mail 343
Setting up e-mail information and preferences 343
Using Mail’s viewer window 346
Receiving e-mail 350
Composing messages 350
Using the Address Book 354
Sending e-mail attachments 357
Receiving attachments 357
Junk mail 358
Threading 360
Smart Mailboxes 360
Summary 362
Trang 21Chapter 11: Setting Up a Local Network 363
The Networking Concept 364
Understanding a computer network 364
Understanding layered networks 364
The Physical Layer 365
Ethernet protocol 366
Making the Ethernet connection 367
The Communications Layer 371
AppleTalk 372
TCP/IP 372
The Application Layer 381
The Network Preference Pane 382
Understanding ports and locations 383
Network status display 383
Configuring the port settings 385
Configuring network ports 399
Working with network locations 402
Getting assistance 403
Other roads for help 404
AirPort 406
Installing AirPort cards 406
Creating a computer-to-computer AirPort network 407
Setting Up an AirPort Base Station 408
Setting up an AirPort Base Station 409
Bluetooth Networking 412
Settings panel 412
Sharing 413
Setting up Bluetooth devices 413
Bluetooth menu bar icon 414
Bluetooth file exchange 414
Summary 416
Chapter 12: Sharing Files and Network Services 417
Accessing Files 417
Connecting to a file server 418
Connecting to Microsoft Windows file servers 424
Connecting to an FTP server 425
Trang 22Sharing Your Files 437Planning for file sharing 437Identifying your computer 439Turning file sharing on and off 440Identifying who can connect for file sharing 445Designating your shared items 445Setting specific access privileges 446Dealing with Security Risks 448Assessing the risks of guest access 448Assessing the risks of administrator access 448Assessing the risk of your Internet connection 448Improving file-sharing security 449Using a personal firewall to improve security 449Sharing Your Internet Connection 451Summary 452
Chapter 13: Deploying More Network Services 453
Making Network Services Available 453Your computer’s IP addresses 454Getting your computer a name 456Hosting Your Own Web Site 457Starting Web sharing 458Loading Web site files 459Visiting your Web site 462Allowing FTP Access 463Turning FTP access on or off 463Avoiding file damage 464Considering security 465Allowing anonymous guest access 467Connecting to your FTP server 467Allowing Remote Login 469Turning remote login on or off 470Connecting for remote login 471Remote Control 473Turning on Remote Control 473Controlling a computer 476Summary 480
Chapter 14: Harnessing Mac 481
About the Mac Service 481Requirements to use Mac 482Signing up for a Mac account 483Updating or upgrading your Mac membership 486Configuring Mac OS X for your Mac account using the Mac
Trang 23Using the Mac Address Book 497Using iDisk 498HomePage 509Creating a Web page with HomePage 509Updating a Web page 513Creating another Web site 514Deleting a page or site 514.Mac Slides Publisher 516iChat AV 518Setting up iChat 519Checking the status of iChat buddies 523Reviewing Buddy List features 524Sending instant messages 525Chatting on a local network 525Video and audio chats 527Video Effects 528Have it multi-way 529Screen Sharing 529iChat Theater 530The Address Book Application 531Setting up the Address Book 532Working with Address Book contacts 534Groups 542Adding a group 543Modifying a group 543Neat group features 543iCal 544Working with calendars 544iSync and Mac Sync 555Setting Mac preferences 556Using the iSync application 558Using the Backup Application 561Backing up 561iCards 568Summary 571
Chapter 15: Managing Fonts 573
Understanding Fonts 573
Trang 24Managing Fonts in Mac OS X 587Font Book 587The Font panel 596The Character Palette 598The Keyboard Viewer 600Third-party font management utilities 601Summary 604
Part III: Beyond the Basics of Mac OS X 605
Chapter 16: Printing and Faxing 607
Overview of Mac OS X Printing 607Configuring Page Setup 609Printing and Faxing Options 610Adding a printer 610Setting print options 612Using the Print & Fax preference pane 615Receiving a fax 616Sending a fax 617Administering Print and Modem Queues 618Maximizing OS X Printing 620Using printer shortcuts 620Pooling printer 621Summary 622
Chapter 17: Managing System Preferences 623
Using the System Preferences Application 625Opening System Preferences 625Harnessing Spotlight 626Unlocking preference settings 626Configuring CDs & DVDs Preferences 628Configuring Date & Time Preferences 629Date & Time panel 629Time Zone panel 630Clock panel 631Configuring Display Preferences 631Display panel 632Geometry panel 634Color panel 635Display Calibrator assistant 635Arrangement panel 637Configuring Energy Saver Preferences 638Sleep panel 638Options panel 639
Trang 25Starting sleep manually 641Waking up your computer 641Configuring Ink Preferences 641Ink preference pane 642Ink window 644Configuring International Preferences 645Language panel 645Customize Sorting sheet 647Formats panel 648Input Menu panel 648Character palettes 650Configuring Keyboard and Mouse Preferences 651Keyboard panel 651Mouse and Trackpad panels 652Bluetooth panel 653Keyboard Shortcuts panel 653Configuring Parental Controls 656Adjusting the System 656Restricting Content 658Limiting Email & Chat 660Managing Time Limits 660Checking Logs 661Adding additional restricted users 662Configuring Sound Preferences 663Sound Effects panel 664Output panel 665Input panel 665Configuring Speech Preferences 665Getting a speech recognition microphone 665Configuring speech recognition 666Using the feedback window 667Looking at the Speech Commands window 669Setting the listening method 669Specifying what commands to listen for 671Specifying which microphone to use 672Specifying the spoken user interface 672Choosing a voice for Mac OS X 672Reading documents aloud 674
Trang 26Chapter 18: Managing User Accounts and Privileges 679
Mac OS X and Privileges 679Identifying Types of User Accounts 680Root 680Administrator (admin) 680User 681Groups 681Configuring Account Preferences 682Password panel 684Login Items panel 691Login Options panel 692Advanced Options 695Workgroup Manager 696Managing Accounts via Parental Controls 697System 698Content filter 699Mail and iChat 702Time Limits 704Logs 705Easier parental management 706Administering Privileges Using Show Info 708Editing folder permissions 709Summary 712
Chapter 19: Integrating in a Windows World 715
Using Microsoft Windows on the Mac 715Boot Camp 715Virtualization 717Sharing Resources with PCs 725Connecting to a PC’s sharepoint from your Mac 725Connecting to a Mac sharepoint from a PC 728Introducing Windows Domain Architecture 733Configuring the PC servers 734Configuring the Mac 735Introducing third-party apps that help 735Revealing Other Considerations 736File naming problems 736Conversions Plus and MacLinkPlus 737Font issues 737Summary 737
Trang 27Part IV: Making the Most of Mac OS X 739
Chapter 20: Enhancing with Utilities 741
Finding Utility Software 741Trying Out Shareware and Freeware 742Using shareware and freeware 744Getting support for shareware and freeware 744List of Mac OS X Utilities 744Airfoil and Audio Hijack 745Back Up User Prefs 745BatChmod 746Carbon Copy Cloner/SuperDuper! 746Cocktail 747coconutBattery and coconutWiFi 747CronniX 748DragThing 748Drop Drawers X 748GeekTool 748GraphicConverter X 748Haxies 749Logorrhea (and Chax) 749MacTracker 750MoRU and Spotless 750NetNewsWire and Vienna 751Neo Office/Open Office 752Renicer 752Pseudo 753QuickImageCM 753QuicKeys X2 754Salling Clicker 754SharePoints 754SideTrack 754Snapz Pro X 2 755StuffIt (Standard/Deluxe) 755SubEthaEdit 755Timbuktu/Apple Remote Desktop/VNC 755TinkerTool/OnyX 756
Trang 28Chapter 21: Maintaining Mac OS X 759
Exploring the Mac OS X Library Folders 759Managing the main Library folder 760Exploring your personal Library folder 762Practicing Good Housekeeping 764Backups 764Maintaining the file system 769Invisible files and folders 770Protecting against viruses 771Keeping software up-to-date 774Maintenance measures 776Scheduling Maintenance 777Maximizing System Performance 778Memory problems 778Insufficient drive space 778Summary 779
Chapter 22: Automating and AppleScript 781
Understanding Messages and Events 782Introducing AppleScript 783AppleScript language 783Scripting additions 784Introducing Script Editor 785Scriptable applications and environments 785Looking at a script window 785Creating a Simple Script 787Analyzing a Script 788Learning application commands and objects 789Inspecting a dictionary 790Saving a Script 791Looking at Script File Formats 791Creating a More Complex Script 792Making a Finder utility 793Beginning the script 793Seeing the script’s results 793Using variables 794Capitalizing script statements 795Getting file information 795Using parentheses 796Working with an application 796Performing script statements conditionally 797Breaking long statements 798Ending the use of an application 799Trying out your script 799
Trang 29Creating a Drag-and-Drop Script Application 800Retrieving dropped files 801Processing dropped files 801Using a repeat loop 802Extending the script 803Borrowing Scripts 803Running Scripts 804Linking Programs 804Allowing remote Apple events 805Scripting across a network 805AppleScript Studio 807Automating with Automator 807Recording actions 812Summary 813
Chapter 23: Commanding Unix 815
Introduction to Unix 816CLI in a GUI world 816The Terminal 817The Shell 819Some common special characters 820Scripting the shell 820Basic Unix Commands 821Unix command syntax 821The man pages 822Logging in and logging out 823Managing files and directories 825Disk and file system statistics 832Viewing and Editing Files 834Standard input, standard output, and pipes 834Learning permissions 837Advanced Unix Topics 840Environment and shell variables 840Manipulating text file contents 842Writing shell scripts 844Making Use of Unix 845What Can I Do with Unix? 845Installing Additional Software 846
Trang 30Wget 856GIMP 858CinePaint (filmGimp) 865Where to Find More Information 865Summary 866
Chapter 24: Securing Mac OS X 867
Introduction to Unix Security 867What Is a Vulnerability? 868Classifications of vulnerabilities 868Keeping aware of vulnerabilities 868Thinking Securely 869Physical Security 870Setting an Open Firmware password 871Using the Security preference pane 872Enabling FileVault protection 872Using Secure Empty Trash 873Viruses 874Understanding the difference between carrier and infected 874Antivirus software 875Network Security 875Understanding TCP/IP 876Understanding network security threats 876Services 878Port usage 878Principle of least privilege 879Monitoring open ports 879Using a graphical interface to check open ports 880Built-in Firewall 881Inspecting firewall rulesets using Terminal 881Implementing firewall rulesets using Sharing preferences 881Protecting Yourself from System Bugs 882Apple Software Update 882Third-party software updates 883System Logs 883Introducing Syslog 883Configuring Syslog to separate interesting messages 884Viewing system logs 885Using Terminal to view log files 886Using the Console application to view log files 887Summary 887
Glossary 889
Trang 31According to popular legend, a Mac is so easy to use that you don’t need to read books about
it Alas, if only that were true The fact is that harnessing all the power of Mac OS X wouldtake a substantial amount of time of exploring and tinkering, and not everyone has thetime, the inclination, or the patience to devote to the mastery of an operating system Save yourtime for having fun with games, surfing the Internet, or perhaps getting some work done Benefitfrom the experience of others (in this case, we the authors)! Read this book so that you can lever-age the full power of OS X without a lot of ambling around the desktop
You might be under the impression that you don’t need this book because of Apple’s supplied Mac
OS X Getting Started Guide and on-screen help Though these are good sources of information, the
Mac OS X Leopard Bible contains a great deal of information and how-to guidance that you won’t
find anywhere else
Trang 35From the moment you see Mac OS X, you know that it’s different from
any other computer operating system on the planet, including earlieriterations of Mac OS Nothing else looks quite like it Yet, use it a bitand you’ll see that there is familiarity about its operation Apple has made
great efforts to ensure that Macintosh users as well as Windows users can
leverage their previous OS skill sets But what sets Mac OS X apart from its
predecessors and its competition is the sum total of its parts
This chapter provides an overview of the core technologies that comprise
Mac OS X Knowing the core technologies can help you master the overall
operation of this world-class operating system The chapter concludes by
examining the system requirements of Mac OS X and its installation
What Is Mac OS X?
Mac OS X is Apple’s answer to the quest for a modern operating system It
combines the power and stability of Unix with the simplicity of Macintosh
In 1996, after continual failed attempts to develop its own next-generation
operating system, Apple management looked outside the company and
acquired NeXT Software, Inc NeXT’s OS at the time was called OpenStep
It had all the features that Apple desired in a modern OS: protected memory,
IN THIS CHAPTERWhat is Mac OS X?
Understanding the core technologies of Mac OS X Reviewing the installation process
Installing Mac OS X Running the Setup Assistant Running Software Update
Introduction and Installation
of Mac OS X
Trang 36Mac OS 10.5 is another evolutionary step in the OS X product line Apple claims it has more than
300 enhancements One of the more significant enhancements, though most likely unperceivable
to most users, is that the product is now a 64-bit Universal OS that is capable of running 32-bitsoftware without recompilation What does this mean in layman’s terms? Mac OS X 10.5 can beinstalled on both Intel and PowerPC CPU-based Macs and will continue to run your existing Mac
OS X application
Mac OS X is capable of addressing up to a whopping 16 exabytes of virtual memory
An exabyte is equivalent to 1,024 petabytes, and a petabyte is equivalent to 1,024 terabytes — that’s a lot of memory.
Core Technologies of Mac OS X
The most important thing to know about Mac OS X is that it is based on open standards This isbecause at the heart of OS X is Unix, which has played a major role in the development of theInternet Because Unix is so Internet-centric, OS X can be integrated in virtually any computingenvironment In fact, the X in Mac OS X represents the X in Unix But fear not; although Mac OS X
is a Unix operating system, its operation does not require the mastery of complex Unix commandsyntax As Apple publicizes, the command line is there for those who would like to use it, but itisn’t required for day-to-day operations You can make as much or as little use of it as you want
If OS X were compared to an automobile, you would see a similarity in that both are composed
of many parts All these parts have very distinct functions, and yet all make up a greater whole.Metaphorically speaking, the intention of Apple was to design a vehicle akin to a Formula 1 racingcar When the engineers at Apple set out to build OS X, they pulled together world-class technolo-gies in an effort to build the most advanced consumer operating system the world has ever seen.The following sections take a closer look at these parts
Mach microkernel
At the center of Darwin is the Mach microkernel based on FreeBSD 5.x, the foundation that vides basic services for all other parts of the operating system Mach was developed at Carnegie-Mellon University, and its history is closely tied with BSD Unix (Berkeley Software Distribution)
pro-It is Mach that gives OS X the features of protected memory architecture, preemptive multitasking,and symmetric multiprocessing
NOTE
Trang 37Protected memory
Protected memory isolates applications in their own individual memory workspaces When anapplication crashes, the program can be terminated without having a negative effect on other running applications or requiring a restart of the computer
Advance memory management
Advance memory management automatically manages physical RAM and virtual memory cally as needed Virtual memory uses hard disk space in lieu of physical RAM Information thatwould normally sit in RAM, but is not currently needed, is transferred to the hard disk to free upphysical RAM for the demands of data/applications that need it This alleviates out-of-memory con-ditions and eliminates the need, experienced by users of previous Macintosh desktop operatingsystems, of having to manually adjust memory allocations
dynami-Preemptive multitasking
Mac OS X, like all Mac OS versions since System 7, allows more than one application to be open
and operating at the same time This capability is known as multitasking Prior to OS X, the Mac OS employed a version of multitasking referred to as cooperative multitasking In cooperative multitask-
ing, applications sometimes seemed unresponsive because the system software could not efficientlymanage the concurrent demands of multiple running programs Mac OS X remedies this by imple-
menting preemptive multitasking Preemptive multitasking prioritizes processor tasks by order
of importance This more efficient method of managing processor tasks allows the computer toremain responsive, even during the most processor-intensive tasks
Symmetric multiprocessing
Symmetric multiprocessing (SMP) provides support for multiprocessor Macintosh computer tems This allows applications to take advantage of two or more processors by assigning applications
sys-to specific processors or by splitting parts of applications, known as threads, between multiple
processors simultaneously Mac OS X is further optimized to take advantage of SMP by employing
a technique known as optimized kernel resource locking Optimized kernel resource locking provides
superior SMP performance by allowing multiple CPUs access to different portions of the kernelsimultaneously Mac OS 10.5 takes multiprocessing another step forward with its multicore proces-sor competency, allowing it to harness the power of up to eight cores simultaneously, which is themaximum number of cores shipping inside of Macintosh computers at the time of this writing
Graphics technologies in Mac OS X
Trang 38by reducing floating-point unit (FPU) CPU utilization by offloading it to the Graphic ProcessingUnit (GPU) of the video hardware Not all video cards are Core Image/Animation capable, but it’ssafe to assume that if your Mac has shipped within the last two years, it will be either fully or par-tially compliant, because the technology is scaling and is dependent upon hardware capabilities.For a complete list of Core Image/Animation-compliant video cards, visit www.apple.com.
OpenGL
Open Graphics Library (OpenGL) started out as a technology initiative by Silicon Graphics, Inc.,
a manufacturer of high-end graphics workstations It has since become an industry standard forthree-dimensional (3-D) graphics rendering It provides a standard graphics application program-ming interface (API) by which software and hardware manufacturers can build 3-D applicationsand hardware across multiple platforms on a common standard OpenGL is very prevalent in gam-ing, computer-aided design (CAD), professional 3-D animation/modeling, and graphic design
QuickTime
QuickTime is Apple’s cross-platform multimedia authoring and distribution engine It’s both a fileformat and a suite of applications QuickTime has been around since 1991 and has matured into avery powerful technology It supports more than 50 media file formats encompassing audio, video,and still images Some examples of these file formats include AIFF, AVI, JPEG, MIDI, MP3, MPEG-1,PICT, and TIFF QuickTime has support for real-time video streaming, allowing viewers to tune in
to live or prerecorded content on demand
Aqua
Though Aqua is not a graphics technology in Mac OS X, it is its graphical user interface (GUI).Appearance-wise, it is a dramatic departure from OS 9’s Platinum interface, although it retains cer-tain common elements This allows for greater familiarity for legacy Macintosh operators, thusmaking the transition to OS X a more intuitive experience
Mac OS X’s application environments
Application environments allow Mac OS X to run its modern OS-enabled applications while taneously supporting legacy Mac OS software An application environment consists of various sys-tem resources, components, and services that allow an application to function Mac OS X has fiveapplication environments: Cocoa, Carbon, Java, BSD, and Classic
Trang 39Cocoa applications are specifically developed for Mac OS X Cocoa applications are incompatiblewith older Macintosh operating systems and, therefore, do not run on Mac OS 9 Cocoa applicationstake advantage of all of Mac OS X’s modern OS features, such as advance memory management,preemptive multitasking, symmetric multiprocessing, and the Aqua interface Apple evangelizesCocoa for its modern object-oriented programming techniques and rapid application developmenttools, which make application development significantly faster and easier than for Carbon Someexamples of Cocoa applications are OS X’s Mail and Preview applications as well as Netopia’sTimbuktu for Mac OS X
Carbon
The greatest advantage of the Carbon application environment is that developers can build tions that run in either Mac OS 9 or OS X When running within OS X, Carbon applications takeadvantage of most of OS X’s modern OS features, including the Aqua interface In order for Carbonapplications to run within Mac OS 9, the CarbonLib library must be present within the Extensionsfolder within the Mac OS 9 System folder Ironically, some Carbon applications do not run underMac OS 9 The most prominent is Microsoft’s Office Version X for Mac
applica-Java
The Mac OS X Java environment is Java 2 Standard Edition-compliant It can run both Java cations and applets The key advantage of Java development is that Java applications can run onany platform that contains a cross-compatible Java Virtual Machine
Packages and bundles
A package, sometimes referred to as a bundle, is a single-icon, point-and-click representation of an
application Mac OS X’s Carbon and Cocoa applications can be comprised of multiple subordinatefiles and resources In the GUI, all of these subordinate pieces are neatly wrapped up into a repre-sentation of a single executable file for the end user To view the contents of an application package,simply press and hold the Control key while highlighting the Carbon or Cocoa application icon
Trang 40FIGURE 1.1
When pondering packages remember the whole is greater than the sum of its parts
Installation Considerations for Mac OS X
Now that we have reviewed the core technologies of Mac OS X, let’s focus on its installation process.Although Mac OS X has a very structured installation process, several variations of installation areavailable The user’s needs dictate the appropriate installation strategy However, before any Mac
OS X implementation can take place, it is necessary to evaluate the target computer to see whether
it meets Apple’s official hardware requirements
Hardware requirements of OS 10.5
Apple’s minimum hardware requirements for Mac OS X 10.5 is a factory-shipped Intel or PowerPCG4 867MHz processor with 512MB of RAM (1GB with Developers Tools), 9GB of available harddrive space (12GB with Developers Tools), a DVD drive, a built-in FireWire port, and an Apple-supplied video option In addition, Boot Camp requires an Intel processor and will run eitherWindows XP Service Pack 2 or Windows Vista (BYOOS — bring your own OS) Photo Boothrequires an iSight camera (built-in or external), USB video class (UVC) camera, or FireWire DVcamcorder, and an Intel or PowerPC G5 processor Backdrop effects require an Intel Core Duo orfaster processor Backdrop effects when using a DV camcorder require fixed focus, exposure, andwhite balance iChat Video requires an iSight camera (built-in or external), a USB video class(UVC) camera or FireWire DV camcorder; and a 128-Kbps upstream and downstream Internetconnection Audio chats require a microphone and a 56-Kbps Internet connection Front Row,