![]() |
| |||||||
Alles rund um Mac OSX & Linux: Google Chrome (auf Mac!) öffnet permanent automatisch WerbungWindows 7 Für alle Fragen rund um Mac OSX, Linux und andere Unix-Derivate. |
| | #1 |
| | Google Chrome (auf Mac!) öffnet permanent automatisch Werbung Hi, ich grab den hier mal aus, weil ich genau das selbe Problem habe und der TE nicht mehr geantwortet hat. edit Bitte keine fremden Threads kapern. Es hat schon seinen Grund, dass hier jeder Hilfesuchende zu SEINEM PERSÖNLICHEN Problem, ein eigenes Thema aufmachen soll. Deine Beiträge wurden in ein neues Thema ausgelagert.... -- cosinus /edit Mein AdwareMedic Log: Code:
ATTFilter 2018-04-17 08:36:09: ----- Scan Started -----
2018-04-17 08:36:09: Scanning with signatures version 51
2018-04-17 08:36:43: No adware found
2018-04-17 08:36:43: ----- Scan Ended -----
Code:
ATTFilter Start time: 08:45:13 04/17/18
Revision: 1174
Model Identifier: MacBookAir7,1
System Version: macOS 10.13.3 (17D47)
Kernel Version: Darwin 17.4.0
System Integrity Protection: Enabled
Time since boot: 24 minutes
FileVault: On
Log
Apr 15 20:58:39 com.apple.xpc.launchd.domain.pid.SecurityAgent.312: Path not allowed in target domain: type = uid, path = /System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/HIServices.framework/Versions/A/XPCServices/com.apple.hiservices-xpcservice.xpc/Contents/MacOS/com.apple.hiservices-xpcservice error = 1: Operation not permitted, origin = /System/Library/Frameworks/Security.framework/Versions/A/MachServices/SecurityAgent.bundle
Apr 15 20:58:39 com.apple.xpc.launchd.domain.pid.SecurityAgent.312: Path not allowed in target domain: type = uid, path = /System/Library/Frameworks/Security.framework/Versions/A/XPCServices/XPCKeychainSandboxCheck.xpc/Contents/MacOS/XPCKeychainSandboxCheck error = 1: Operation not permitted, origin = /System/Library/Frameworks/Security.framework/Versions/A/MachServices/SecurityAgent.bundle
Apr 15 20:58:39 com.apple.xpc.launchd.domain.pid.SecurityAgent.312: Path not allowed in target domain: type = uid, path = /System/Library/Frameworks/IOKit.framework/Versions/A/XPCServices/IOServiceAuthorizeAgent.xpc/Contents/MacOS/IOServiceAuthorizeAgent error = 1: Operation not permitted, origin = /System/Library/Frameworks/Security.framework/Versions/A/MachServices/SecurityAgent.bundle
Apr 15 20:58:39 com.apple.xpc.launchd.domain.pid.SecurityAgent.312: Path not allowed in target domain: type = uid, path = /System/Library/PrivateFrameworks/SpeechRecognitionCore.framework/Versions/A/XPCServices/com.apple.SpeechRecognitionCore.brokerd.xpc/Contents/MacOS/com.apple.SpeechRecognitionCore.brokerd error = 1: Operation not permitted, origin = /System/Library/Frameworks/Security.framework/Versions/A/MachServices/SecurityAgent.bundle
Apr 15 20:58:39 com.apple.xpc.launchd.domain.pid.SecurityAgent.312: Failed to bootstrap path: path = /System/Library/Frameworks/Security.framework/Versions/A/XPCServices/XPCTimeStampingService.xpc, error = 1: Operation not permitted
Apr 15 20:58:39 com.apple.xpc.launchd.domain.pid.SecurityAgent.312: Failed to bootstrap path: path = /System/Library/PrivateFrameworks/SpeechRecognitionCore.framework/Versions/A/XPCServices/com.apple.SpeechRecognitionCore.brokerd.xpc, error = 1: Operation not permitted
Apr 15 20:58:39 com.apple.xpc.launchd.domain.pid.SecurityAgent.312: Failed to bootstrap path: path = /System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/HIServices.framework/Versions/A/XPCServices/com.apple.hiservices-xpcservice.xpc, error = 1: Operation not permitted
Apr 15 20:58:39 com.apple.xpc.launchd.domain.pid.SecurityAgent.312: Failed to bootstrap path: path = /System/Library/Frameworks/CoreServices.framework/Versions/A/Frameworks/DictionaryServices.framework/Versions/A/XPCServices/com.apple.DictionaryServiceHelper.xpc, error = 1: Operation not permitted
Apr 15 20:58:39 com.apple.xpc.launchd.domain.pid.SecurityAgent.312: Failed to bootstrap path: path = /System/Library/Frameworks/IOKit.framework/Versions/A/XPCServices/IOServiceAuthorizeAgent.xpc, error = 1: Operation not permitted
Apr 15 20:58:39 com.apple.xpc.launchd.domain.pid.SecurityAgent.312: Failed to bootstrap path: path = /System/Library/Frameworks/Security.framework/Versions/A/XPCServices/XPCKeychainSandboxCheck.xpc, error = 1: Operation not permitted
Apr 15 20:58:48 com.avast.home.userinit: Service setup event to handle failure and will not launch until it fires.
Apr 15 21:12:28 com.apple.iTunesHelper.5268: Service exited with abnormal code: 1
Apr 15 21:12:28 com.apple.Siri.agent: Service exited with abnormal code: 1
Apr 16 10:33:44 Failed to remove file or directory: name = com.apple.pkg.CoreFP.igFkBn, error = 1: Operation not permitted. Further logging suppressed.
Apr 16 10:33:44 com.apple.xpc.launchd.domain.system: Could not import service from caller: path = /System/Library/LaunchDaemons/com.apple.platform.ptmd.plist, caller = launchd.1, error = 138: Service cannot be loaded on this hardware
Apr 16 10:34:02 com.avast.home.userinit: Service setup event to handle failure and will not launch until it fires.
Apr 16 10:34:09 com.google.keystone.user.agent: Service exited with abnormal code: 1
Apr 16 10:34:40 com.apple.xpc.launchd.domain.system: Could not read path: path = /Library/LaunchDaemons/com.microsoft.autoupdate.helpertool.plist, error = 2: No such file or directory
Apr 16 11:25:41 com.apple.iTunesHelper.5268: Service exited with abnormal code: 1
Apr 16 11:25:41 com.apple.Siri.agent: Service exited with abnormal code: 1
Apr 17 08:21:47 Failed to remove file or directory: name = com.apple.pkg.CoreFP.igFkBn, error = 1: Operation not permitted. Further logging suppressed.
Apr 17 08:21:47 com.apple.xpc.launchd.domain.system: Could not import service from caller: path = /System/Library/LaunchDaemons/com.apple.platform.ptmd.plist, caller = launchd.1, error = 138: Service cannot be loaded on this hardware
Apr 17 08:22:02 com.avast.home.userinit: Service setup event to handle failure and will not launch until it fires.
Apr 17 08:22:13 com.google.keystone.user.agent: Service exited with abnormal code: 1
Apr 17 08:40:04 com.apple.xpc.launchd.domain.pid.quicklookd.1620: Path not allowed in target domain: type = pid, path = /Library/Frameworks/iTunesLibrary.framework/Versions/A/XPCServices/com.apple.iTunesLibraryService.xpc error = 147: The specified service did not ship in the requestor's bundle, origin = /System/Library/Frameworks/QuickLook.framework/Versions/A/Resources/quicklookd.app
Bad kernel extensions
/System/Library/Extensions/AppleOSXUSBNCM.kext
Loaded kernel extensions
com.avast.FileShield (4.0.0) UUID
com.avast.PacketForwarder (2.1) UUID
Daemons
com.avast.account
com.avast.daemon
com.avast.fileshield
com.avast.init
com.avast.osx.secureline.burger
com.avast.osx.secureline.init
com.avast.osx.secureline.racoonrun
com.avast.osx.secureline.service
com.avast.osx.secureline.uninstall
com.avast.osx.secureline.update
com.avast.proxy
com.avast.service
com.avast.uninstall
com.avast.update
com.avast.wifiguard
com.microsoft.autoupdate.helper
com.microsoft.office.licensingV2.helper
org.postfix.master
Agents
6H4HRTU5E3.com.avast.osx.secureline.avastsecurelinehelper
com.apple.iBooksX.CacheDelete
com.avast.helper
com.avast.home.userinit
- status: 78
com.avast.osx.secureline.home.userinit
com.avast.osx.secureline.update-agent
com.avast.osx.secureline.userinit
com.avast.userinit
com.dropbox.DropboxMacUpdate.agent
com.google.keystone.user.agent
- status: 1
com.microsoft.update.agent
dylibs
/Library/Application Support/Avast/components/proxy/certutil/libfreebl3.dylib
/Library/Application Support/Avast/components/proxy/certutil/libnspr4.dylib
/Library/Application Support/Avast/components/proxy/certutil/libnss3.dylib
/Library/Application Support/Avast/components/proxy/certutil/libnssdbm3.dylib
/Library/Application Support/Avast/components/proxy/certutil/libnssutil3.dylib
/Library/Application Support/Avast/components/proxy/certutil/libplc4.dylib
/Library/Application Support/Avast/components/proxy/certutil/libplds4.dylib
/Library/Application Support/Avast/components/proxy/certutil/libsmime3.dylib
/Library/Application Support/Avast/components/proxy/certutil/libsoftokn3.dylib
/Library/Application Support/Avast/components/proxy/certutil/libssl3.dylib
/Library/Application Support/Avast/lib/libcrypto.1.0.0.dylib
/Library/Application Support/Avast/lib/libhns.dylib
/Library/Application Support/Avast/lib/libjsoncpp.1.8.3.dylib
/Library/Application Support/Avast/lib/libprotobuf-lite.8.dylib
/Library/Application Support/Avast/lib/libssl.1.0.0.dylib
/Users/USER/Library/Application Support/Firefox/Profiles/pp09kinh.default/gmp-gmpopenh264/1.5.3/libgmpopenh264.dylib
/Users/USER/Library/Application Support/Firefox/Profiles/pp09kinh.default/gmp-widevinecdm/1.4.8.903/libwidevinecdm.dylib
/Users/USER/Library/VirtualDJ/Plugins/libmp3lame.dylib
App extensions
com.getdropbox.dropbox.garcon
com.microsoft.onenote.mac.shareextension
Contents of /Library/Preferences/SystemConfiguration/com.apple.Boot.plist
- mod date: Jul 15 22:38:22 2017
- checksum: 1199119104
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "hxxp://www.apple.com/DTDs/PropertyList-1.0.dtd">
<plist version="1.0">
<dict>
<key>Kernel Flags</key>
<string></string>
</dict>
</plist>
Contents of /Library/Preferences/com.apple.security.appsandbox.plist
- mod date: Aug 4 11:26:31 2017
- checksum: 2599182411
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "hxxp://www.apple.com/DTDs/PropertyList-1.0.dtd">
<plist version="1.0">
<dict>
<key>UnrestrictSpotlightContainerScope</key>
<true/>
</dict>
</plist>
Contents of /etc/hosts
- mod date: Feb 25 23:50:13 2016
- checksum: 3164423663
127.0.0.1 localhost
255.255.255.255 broadcasthost
::1 localhost
Contents of /etc/pam.d/authorization
- mod date: Oct 3 03:04:58 2017
- checksum: 1288902703
auth optional pam_krb5.so use_first_pass use_kcminit
auth optional pam_ntlm.so use_first_pass
auth required pam_opendirectory.so use_first_pass nullok
account required pam_opendirectory.so
Contents of /etc/pam.d/authorization_aks
- mod date: Oct 3 02:59:34 2017
- checksum: 841932527
auth required pam_aks.so
account required pam_opendirectory.so
Contents of /etc/pam.d/authorization_ctk
- mod date: Oct 3 03:00:59 2017
- checksum: 2418984201
auth required pam_smartcard.so use_first_pass pkinit
account required pam_opendirectory.so
Contents of /etc/pam.d/authorization_la
- mod date: Oct 3 02:59:54 2017
- checksum: 2713564393
auth required pam_localauthentication.so
auth required pam_aks.so
account required pam_opendirectory.so
Contents of /etc/pam.d/authorization_lacont
- mod date: Oct 3 02:59:54 2017
- checksum: 3048101696
auth required pam_localauthentication.so continuityunlock
auth required pam_aks.so
account required pam_opendirectory.so
Contents of /etc/pam.d/checkpw
- mod date: Oct 3 02:40:14 2017
- checksum: 2672765862
auth required pam_opendirectory.so use_first_pass nullok
account required pam_opendirectory.so no_check_home no_check_shell
Contents of /etc/pam.d/chkpasswd
- mod date: Sep 30 03:24:58 2017
- checksum: 335781771
auth required pam_opendirectory.so
account required pam_opendirectory.so
password required pam_permit.so
session required pam_permit.so
Contents of /etc/pam.d/cups
- mod date: Oct 12 07:51:27 2017
- checksum: 2842188894
auth required pam_opendirectory.so
account required pam_permit.so
password required pam_deny.so
session required pam_permit.so
Contents of /etc/pam.d/login
- mod date: Sep 30 03:24:31 2017
- checksum: 1242678644
auth optional pam_krb5.so use_kcminit
auth optional pam_ntlm.so try_first_pass
auth optional pam_mount.so try_first_pass
auth required pam_opendirectory.so try_first_pass
account required pam_nologin.so
account required pam_opendirectory.so
password required pam_opendirectory.so
session required pam_launchd.so
session required pam_uwtmp.so
session optional pam_mount.so
Contents of /etc/pam.d/login.term
- mod date: Sep 30 03:24:31 2017
- checksum: 3930746290
account required pam_nologin.so
account required pam_opendirectory.so
session required pam_uwtmp.so
Contents of /etc/pam.d/other
- mod date: Jul 15 23:02:50 2017
- checksum: 2748091512
auth required pam_deny.so
account required pam_deny.so
password required pam_deny.so
session required pam_deny.so
Contents of /etc/pam.d/passwd
- mod date: Sep 30 03:24:20 2017
- checksum: 1026516346
auth required pam_permit.so
account required pam_opendirectory.so
password required pam_opendirectory.so
session required pam_permit.so
Contents of /etc/pam.d/screensaver
- mod date: Oct 3 03:12:26 2017
- checksum: 3141704602
auth optional pam_krb5.so use_first_pass use_kcminit
auth required pam_opendirectory.so use_first_pass nullok
account required pam_opendirectory.so
account sufficient pam_self.so
account required pam_group.so no_warn group=admin,wheel fail_safe
account required pam_group.so no_warn deny group=admin,wheel ruser fail_safe
Contents of /etc/pam.d/screensaver_aks
- mod date: Oct 3 02:59:34 2017
- checksum: 3209544573
auth required pam_aks.so
account required pam_opendirectory.so
account sufficient pam_self.so
account required pam_group.so no_warn group=admin,wheel fail_safe
account required pam_group.so no_warn deny group=admin,wheel ruser fail_safe
Contents of /etc/pam.d/screensaver_ctk
- mod date: Oct 3 03:00:59 2017
- checksum: 367670211
auth required pam_smartcard.so use_first_pass
account required pam_opendirectory.so
account sufficient pam_self.so
account required pam_group.so no_warn group=admin,wheel fail_safe
account required pam_group.so no_warn deny group=admin,wheel ruser fail_safe
Contents of /etc/pam.d/screensaver_la
- mod date: Oct 3 02:59:54 2017
- checksum: 589164084
auth required pam_localauthentication.so
auth required pam_aks.so
account required pam_opendirectory.so
account sufficient pam_self.so
account required pam_group.so no_warn group=admin,wheel fail_safe
account required pam_group.so no_warn deny group=admin,wheel ruser fail_safe
Contents of /etc/pam.d/smbd
- mod date: Jul 16 01:42:11 2017
- checksum: 2516643123
account required pam_sacl.so sacl_service=smb allow_trustacct
session required pam_permit.so
Contents of /etc/pam.d/sshd
- mod date: Jul 16 00:02:08 2017
- checksum: 2989478361
auth optional pam_krb5.so use_kcminit
auth optional pam_ntlm.so try_first_pass
auth optional pam_mount.so try_first_pass
auth required pam_opendirectory.so try_first_pass
account required pam_nologin.so
account required pam_sacl.so sacl_service=ssh
account required pam_opendirectory.so
password required pam_opendirectory.so
session required pam_launchd.so
session optional pam_mount.so
Contents of /etc/pam.d/su
- mod date: Jul 15 23:10:42 2017
- checksum: 2045483434
auth sufficient pam_rootok.so
auth required pam_opendirectory.so
account required pam_group.so no_warn group=admin,wheel ruser root_only fail_safe
account required pam_opendirectory.so no_check_shell
password required pam_opendirectory.so
session required pam_launchd.so
Contents of /etc/pam.d/sudo
- mod date: Jul 15 23:04:32 2017
- checksum: 1168067210
auth sufficient pam_smartcard.so
auth required pam_opendirectory.so
account required pam_permit.so
password required pam_deny.so
session required pam_permit.so
Contents of /etc/periodic/daily/110.clean-tmps
- mod date: Jul 15 23:02:04 2017
- checksum: 4099837049
if [ -r /etc/defaults/periodic.conf ]
then
. /etc/defaults/periodic.conf
source_periodic_confs
fi
case "$daily_clean_tmps_enable" in
[Yy][Ee][Ss])
if [ -z "$daily_clean_tmps_days" ]
then
echo '$daily_clean_tmps_enable is set but' \
'$daily_clean_tmps_days is not'
rc=2
else
echo ""
echo "Removing old temporary files:"
set -f noglob
args="-atime +$daily_clean_tmps_days -mtime +$daily_clean_tmps_days"
args="${args} -ctime +$daily_clean_tmps_days"
dargs="-empty -mtime +$daily_clean_tmps_days"
dargs="${dargs} ! -name .vfs_rsrc_streams_*"
[ -n "$daily_clean_tmps_ignore" ] && {
args="$args "`echo " ${daily_clean_tmps_ignore% }" |
sed 's/[ ][ ]*/ ! -name /g'`
dargs="$dargs "`echo " ${daily_clean_tmps_ignore% }" |
sed 's/[ ][ ]*/ ! -name /g'`
...and 21 more line(s)
Contents of /etc/periodic/daily/130.clean-msgs
- mod date: Jul 15 23:02:04 2017
- checksum: 4292599426
if [ -r /etc/defaults/periodic.conf ]
then
. /etc/defaults/periodic.conf
source_periodic_confs
fi
case "$daily_clean_msgs_enable" in
[Yy][Ee][Ss])
if [ ! -d /var/msgs ]
then
echo '$daily_clean_msgs_enable is set but /var/msgs' \
"doesn't exist"
rc=2
else
echo ""
echo "Cleaning out old system announcements:"
[ -n "$daily_clean_msgs_days" ] &&
arg=-${daily_clean_msgs_days#-} || arg=
msgs -c $arg && rc=0 || rc=3
fi;;
*) rc=0;;
esac
exit $rc
Contents of /etc/periodic/daily/140.clean-rwho
- mod date: Jul 15 23:02:04 2017
- checksum: 659374794
if [ -r /etc/defaults/periodic.conf ]
then
. /etc/defaults/periodic.conf
source_periodic_confs
fi
case "$daily_clean_rwho_enable" in
[Yy][Ee][Ss])
if [ -z "$daily_clean_rwho_days" ]
then
echo '$daily_clean_rwho_enable is enabled but' \
'$daily_clean_rwho_days is not set'
rc=2
elif [ ! -d /var/rwho ]
then
echo '$daily_clean_rwho_enable is enabled but /var/rwho' \
"doesn't exist"
rc=2
else
echo ""
echo "Removing stale files from /var/rwho:"
case "$daily_clean_rwho_verbose" in
[Yy][Ee][Ss])
print=-print;;
*)
print=;;
...and 14 more line(s)
Contents of /etc/periodic/daily/199.clean-fax
- mod date: Jul 15 23:02:04 2017
- checksum: 1104983357
if [ -r /etc/defaults/periodic.conf ]
then
. /etc/defaults/periodic.conf
source_periodic_confs
fi
if [ -d /var/spool/fax ]; then
echo ""
echo "Removing scratch fax files"
cd /var/spool/fax && \
find . -type f -name '[0-9]*.[0-9][0-9][0-9]' -mtime +7 -delete >/dev/null 2>&1;
fi
Contents of /etc/periodic/daily/310.accounting
- mod date: Jul 15 23:02:04 2017
- checksum: 3208203734
if [ -r /etc/defaults/periodic.conf ]
then
. /etc/defaults/periodic.conf
source_periodic_confs
fi
case "$daily_accounting_enable" in
[Yy][Ee][Ss])
if [ ! -f /var/account/acct ]
then
echo '$daily_accounting_enable is set but /var/account/acct' \
"doesn't exist"
rc=2
elif [ -z "$daily_accounting_save" ]
then
echo '$daily_accounting_enable is set but ' \
'$daily_accounting_save is not'
rc=2
else
echo ""
echo "Rotating accounting logs and gathering statistics:"
cd /var/account
rc=0
n=$daily_accounting_save
rm -f acct.$n.gz acct.$n || rc=3
m=$n
...and 18 more line(s)
Contents of /etc/periodic/daily/400.status-disks
- mod date: Jul 15 23:02:04 2017
- checksum: 1480768650
if [ -r /etc/defaults/periodic.conf ]
then
. /etc/defaults/periodic.conf
source_periodic_confs
fi
case "$daily_status_disks_enable" in
[Yy][Ee][Ss])
echo ""
echo "Disk status:"
df $daily_status_disks_df_flags && rc=1 || rc=3
;;
*) rc=0;;
esac
exit $rc
Contents of /etc/periodic/daily/420.status-network
- mod date: Jul 15 23:02:04 2017
- checksum: 2730873650
if [ -r /etc/defaults/periodic.conf ]
then
. /etc/defaults/periodic.conf
source_periodic_confs
fi
case "$daily_status_network_enable" in
[Yy][Ee][Ss])
echo ""
echo "Network interface status:"
case "$daily_status_network_usedns" in
[Yy][Ee][Ss])
netstat -i && rc=0 || rc=3;;
*)
netstat -in && rc=0 || rc=3;;
esac;;
*) rc=0;;
esac
exit $rc
Contents of /etc/periodic/daily/430.status-rwho
- mod date: Jul 15 23:02:04 2017
- checksum: 3455351261
if [ -r /etc/defaults/periodic.conf ]
then
. /etc/defaults/periodic.conf
source_periodic_confs
fi
case "$daily_status_rwho_enable" in
[Yy][Ee][Ss])
rwho=$(echo /var/rwho/*)
if [ -f "${rwho%% *}" ]
then
echo ""
echo "Local network system status:"
prog=ruptime
else
echo ""
echo "Local system status:"
prog=uptime
fi
rc=$($prog | tee /dev/stderr | wc -l)
if [ $? -eq 0 ]
then
[ $rc -gt 1 ] && rc=1
else
rc=3
fi;;
...and 3 more line(s)
Contents of /etc/periodic/daily/999.local
- mod date: Jul 15 23:02:04 2017
- checksum: 2319755381
if [ -r /etc/defaults/periodic.conf ]
then
. /etc/defaults/periodic.conf
source_periodic_confs
fi
rc=0
for script in $daily_local
do
echo ''
case "$script" in
/*)
if [ -f "$script" ]
then
echo "Running $script:"
sh $script || rc=3
else
echo "$script: No such file"
[ $rc -lt 2 ] && rc=2
fi;;
*)
echo "$script: Not an absolute path"
[ $rc -lt 2 ] && rc=2;;
esac
done
exit $rc
Contents of /etc/periodic/monthly/199.rotate-fax
- mod date: Jul 15 23:02:04 2017
- checksum: 3437454680
if [ -r /etc/defaults/periodic.conf ]
then
. /etc/defaults/periodic.conf
source_periodic_confs
fi
echo ""
printf %s "Rotating fax log files:"
cd /var/log/fax
for i in *.log; do
if [ -f "${i}" ]; then
echo -n " $i"
if [ -x /usr/bin/gzip ]; then gzext=".gz"; else gzext=""; fi
if [ -f "${i}.3${gzext}" ]; then mv -f "${i}.3${gzext}" "${i}.4${gzext}"; fi
if [ -f "${i}.2${gzext}" ]; then mv -f "${i}.2${gzext}" "${i}.3${gzext}"; fi
if [ -f "${i}.1${gzext}" ]; then mv -f "${i}.1${gzext}" "${i}.2${gzext}"; fi
if [ -f "${i}.0${gzext}" ]; then mv -f "${i}.0${gzext}" "${i}.1${gzext}"; fi
if [ -f "${i}" ]; then mv -f "${i}" "${i}.0" && if [ -x /usr/bin/gzip ]; then gzip -9 "${i}.0"; fi; fi
touch "${i}" && chmod 640 "${i}" && chown root:admin "${i}"
fi
done
echo ""
Contents of /etc/periodic/monthly/200.accounting
- mod date: Jul 15 23:02:04 2017
- checksum: 3541581936
if [ -r /etc/defaults/periodic.conf ]
then
. /etc/defaults/periodic.conf
source_periodic_confs
fi
oldmask=$(umask)
umask 066
case "$monthly_accounting_enable" in
[Yy][Ee][Ss])
W=/var/log/wtmp
rc=0
remove=NO
if [ $rc -eq 0 ]
then
echo ""
echo "Doing login accounting:"
rc=$(ac -p | sort -nr -k 2 | tee /dev/stderr | wc -l)
[ $rc -gt 0 ] && rc=1
fi
[ $remove = YES ] && rm -f $W.0;;
*) rc=0;;
esac
umask $oldmask
exit $rc
Contents of /etc/periodic/monthly/999.local
- mod date: Jul 15 23:02:04 2017
- checksum: 2355967272
if [ -r /etc/defaults/periodic.conf ]
then
. /etc/defaults/periodic.conf
source_periodic_confs
fi
rc=0
for script in $monthly_local
do
echo ''
case "$script" in
/*)
if [ -f "$script" ]
then
echo "Running $script:"
sh $script || rc=3
else
echo "$script: No such file"
[ $rc -lt 2 ] && rc=2
fi;;
*)
echo "$script: Not an absolute path"
[ $rc -lt 2 ] && rc=2;;
esac
done
exit $rc
Contents of /etc/periodic/weekly/320.whatis
- mod date: Jul 15 23:02:04 2017
- checksum: 922328658
if [ -r /etc/defaults/periodic.conf ]
then
. /etc/defaults/periodic.conf
source_periodic_confs
fi
case "$weekly_whatis_enable" in
[Yy][Ee][Ss])
echo ""
echo "Rebuilding whatis database:"
MANPATH=`/usr/bin/manpath -q`
if [ $? = 0 ]
then
if [ -z "${MANPATH}" ]
then
echo "manpath failed to find any manpage directories"
rc=3
else
rc=0
/usr/libexec/makewhatis.local "${MANPATH}" || rc=3
if [ X"${man_locales}" != X ]
then
for i in ${man_locales}
do
LC_ALL=$i /usr/libexec/makewhatis.local -a \
-L "${MANPATH}" || rc=3
...and 9 more line(s)
Contents of /etc/periodic/weekly/999.local
- mod date: Jul 15 23:02:04 2017
- checksum: 3078968429
if [ -r /etc/defaults/periodic.conf ]
then
. /etc/defaults/periodic.conf
source_periodic_confs
fi
rc=0
for script in $weekly_local
do
echo ''
case "$script" in
/*)
if [ -f "$script" ]
then
echo "Running $script:"
sh $script || rc=3
else
echo "$script: No such file"
[ $rc -lt 2 ] && rc=2
fi;;
*)
echo "$script: Not an absolute path"
[ $rc -lt 2 ] && rc=2;;
esac
done
exit $rc
Contents of /etc/pf.conf
- mod date: Jul 15 23:55:36 2017
- checksum: 2891177609
scrub-anchor "com.apple/*"
nat-anchor "com.apple/*"
rdr-anchor "com.apple/*"
dummynet-anchor "com.apple/*"
anchor "com.apple/*"
load anchor "com.apple" from "/etc/pf.anchors/com.apple"
Contents of /etc/syslog.conf
- mod date: Jul 22 04:17:16 2017
- checksum: 2399118465
install.* @127.0.0.1:32376
Firewall: On
DNS: 160.45.8.8 (static)
User login items
Unified Remote
- /Applications/Unified Remote.app
Dropbox
- /Applications/Dropbox.app
iTunesHelper
- /Applications/iTunes.app/Contents/MacOS/iTunesHelper.app
Restricted files: 2501
Lockfiles: 20
Elapsed time (sec): 342
Geändert von cosinus (18.04.2018 um 09:07 Uhr) |