I got a shiny new M1 Max MacBook Pro this week. When I setup new computers I tend to opt for setting them up new and transferring the data over “manually”; i.e. not using Migration Assistant.
I started this migration the same way that I traditionally have, using Share Disk (formerly Target Disk Mode (TDM)) and
rsync. I made a few observations and, in the end, changes to how I’ll be doing data migrations going forward.
Recently I’ve been trying to get a KEXT to load in Big Sur on both Intel and Apple Silicon Macs without requiring an admin user to approve loading the KEXT and avoiding Apple Silicon’s “reboot into recovery to allow KEXT loading” bit.
This post will cover the MDM profile I’m deploying along with some commands that I used to help with testing KEXT deployment and approval on Big Sur.
I recently published my first ever Python module to PyPi – macusers. It simplifies getting the current logged in user even when the script is running as root or at login window. I’ve been using the code for a long time now in my Munki scripts and custom packages.
Those of us getting the new M1 Macs quickly found out that the traditional way of wiping a Mac using Disk Utility no longer works as expected. When using this method we’ve found numerous bugs and it typically leads us to needing to DFU the M1 Mac and use Apple Configurator 2 to completely wipe and restore it.
Here is the best way that I’ve found to completely wipe and reload an M1 Mac.
Second day of vacation and I get a text ‘backup server is full’. Well, that sucks. Pretty sure it had 1.5TB a week or two ago. Sure enough, 0 bytes available.
With the M1 Macs out and getting my hands on an M1 Mac mini, I got curious which applications are installing as Universal Binaries for ARM, and which are x86 only and need Rosetta 2 to run.
The goal of this post is to serve as a quick guide to gaining access to all Azure subscriptions.
This year I got to speak at Penn State’s MacAdmins conference about if a NAS is the right tool to move to from macOS server.
You can find more information about my talk on the MacAdmins conference website here.
You can find my slides here:
On occasion I need to test external access to my office or sometimes I’m on public Wi-Fi and want to securely browse the internet without connecting to a VPN. For times like those I use an SSH reverse proxy tunnel to a VPS and Firefox. This routes all of my Firefox traffic through my VPS securely over SSH.
All you need to accomplish this is an SSH server somewhere that you trust and Firefox. Once you have an SSH server up, go through these steps: