@ Sir1963: I was with you until you said that 'MacUpdate is still prone to the same financial choices versionTracker had and could devalue/disappear one day too.' Every product or service is subject to financial pressures - and choices. That's the nature of a free market. There's no reason MacUpdate should or could be free from the market risks that face everyone else in business.As for the Mac App Store, the reactions seem to depend on whether a person sees it as a glass half full or half empty sort of thing. In fact developers have the same opportunities to market their software as they've always had. The App Store hasn't shut down any of these channels. If anything it shines a positive light on developer distributed software. If you read the 'small print' posted by many developers, you'll see that the App Store version of their software is limited in ways their own distros are not. Of course you may only see this if you check it out on MacUpdate first. The App Store doesn't list apps as crippleware - though perhaps it should.MacUpdate itself is a testament to the free market. As far as I can tell, most software listed here is not distributed via the MAS. Even most OS X updates are available as they've always been, as standalone packages from the Apple Download page.At worst the MAS is a mixed bag. Among its strengths is an almost complete absence of malware; among its weaknesses are the limitations it places on some developers. As for Gatekeeper, it's quite simple to disable it if you need to. You choose the level of security it provides. It doesn't impose anything on anyone. I use plenty of software that is not yet Apple certified. I just right-click an app the first time I run it and choose Open. If I choose to launch it, it will no longer be blocked by Gatekeeper, no matter what my security settings are. Some people find these extra steps to be a nuisance. I see them as a small price to pay in an increasingly insecure cyber world. For example, I just got my notice from Adobe about how their servers were hacked and an unknown number of customer accounts may have been compromised. It's easy to be mad at Adobe for this lapse in security, but it's a certain sign of the times.Given these times, in my opinion Apple is justified in battening down the hatches as securely as they can - and they are providing an essential service to the large majority of their customers by doing so. In the past Apple was guilty of taking security issues too lightly. And they were roundly criticized for it. Now they are taking security seriously - and they are criticized for this too. This tells us more about the critics than it does about Apple.
Rather than remembering a separate password and set of login information for unlocking a Mac, OS X offers the option to use an iCloud password to login to the computer at boot, reboot, authentication, locked screens, and all login windows instead. Bom is a file system used by the Mac OS X installer to determine which files to install, remove, or upgrade. Lsof /usr/sbin/lsof lists information about files opened by processes.
Active6 months ago
Is there a Mac/Unix commands that lets you see the local network in terms of machines/IP addresses? If there's something on the Mac that is gui-based that would be great too.
ping the broadcast address (the broadcast address is printed as part of the output to ifconfig en0)
The hosts answering are on your local network. (You may also try arp -a but that only keeps track of recently contacted hosts so you may want to run it after the broadcast.)
There is a program called Bonjour Browser that will list well known services that have registered on your local network. I believe that most Macs have one or more registered protocols by default.
The only way to reliably do this is to scan the network using ping sweeps and similar techniques looking for open ports etc on various addresses. You can do that with nmap which is available for OS X. See http://www.netadmintools.com/art406.html for an example.
EDIT: Just to clarify, as diciu pointed out, you can usually ping the broadcast address and/or use your arp cache as well. This will probably work for most home networks where directed broadcast is allowed.
If not, then you would need to run a ping sweep with a tool like nmap to individually check each address for an available host. Many network discovery/scanning tools can check for more than just ping, looking for listening ports, SNMP, etc. as well.
in the days of tiger (10.4) every mac broadcast a 'presence' service on bonjour, which made finding macintoshes on the network a snap. alas, no more...
ecumeecume
You can use Nmap but that seems to be a bit much for your stated goals.
OS X ships with netstat, or open Up /Applications/Utilities/Network Utility.app, perhaps this will work for you?
EDIT: oops. netstat doesn't do what I thought.
Dos Command For Network Discovery
M. Dave AuayanM. Dave Auayan
angry IP scanner for a no mus - no fuss IP scanner with basic port scanning.NMap and Zenmap for the big power scans.I actually use both together, as nmap can get easily sidetracked by certain reverse proxy boxes.
Josh BiermanJosh Bierman
You can use netdiscover on Mac OS, which is based on ARP packets. It will send ARP requests and scan the response.
For example, run netdiscover command sudo netdiscover -i en0 -r 10.106.0.0/16 in my local network would bring the following result: