Since the program literally captures everything taking place on a monitored computer it’s important to keep in mind that you may be putting secure information at risk. When installed this way Spector Pro will not record anything taking place on the Viewer Only computer but will allow you to view the data being recorded on any monitored computer.Īs with eBlaster, Spector Pro can raise several security issues. To do that you need to install Spector Pro in Viewer Only mode on another Mac. While Spector Pro is designed for you to review recorded activity while sitting at the monitored computer, it’s also possible for you to view these same reports remotely as long as you have network access to the monitored computer and a valid user account on the monitored computer. Second, Spector Pro makes it possible to customize what you’re tracking based upon which user is logged in at the computer, giving you fine-grained access to what’s being monitored. That is all of the output that I received.The application offers several useful customization tools, First, if there’s a website that someone’s visiting that you don’t want them to have access to anymore, Spector Pro offers you the option of blocking that site, although it will not block any page set as the user’s default Home Page. Also remember to post the output.Ĭom.apple.third_party_32b_kext_ist Remember, steps 1-5 are all drag-and-drop or copy-and-paste, whichever you prefer - no typing, except your password. Osascript -e 'tell application "System Events" to get name of every login item' 2> /dev/null Important: If you formerly synchronized with a MobileMe account, your me.com email address may appear in the output of the above command. Kextstat -kl | awk '!/com\.apple/* L*/Fonts 2> /dev/null You should then get a new line ending in a dollar sign.Ĭopy or drag - do not type - the line below into the Terminal window, then press return: If you get the percent sign, enter “sh” and press return. When you launch Terminal, a text window will open with a line already in it, ending either in a dollar sign (“$”) or a percent sign (“%”). Click Utilities, then Terminal in the page that opens. The application is in the folder that opens. ☞ In the Finder, select Go ▹ Utilities from the menu bar, or press the key combination shift-command-U. Select it in the results (it should be at the top.) ☞ Enter the first few letters of its name into a Spotlight search. Launch the Terminal application in any of the following ways: Most personal Macs have only one user, and in that case this paragraph doesn’t apply. The other steps should be taken as the user who has the problem, if different. Ordinarily that would be the user created automatically when you booted the system for the first time. Note: If you have more than one user account, Step 2 must be taken as an administrator. The headings “Step 1” and so on are not part of the commands. The whole line will highlight, and you can then either copy or drag it. You can accomplish this easily by triple-clicking anywhere in the line. Some of the commands will line-wrap or scroll in your browser, but each one is really just a single line, all of which must be selected. If you have doubts about the safety of the procedure suggested here, search this site for other discussions in which it’s been followed without any report of ill effects. The commands are harmless, but they must be entered exactly as given in order to work. If you’re now running in safe mode, reboot as usual before continuing.īelow are instructions to enter some UNIX shell commands. These steps are to be taken while booted in “normal” mode, not in safe mode. Don’t be alarmed by the complexity of these instructions - they’re easy to carry out and won’t change anything on your Mac. The following procedure will help whether your system has been modified. Please read this whole message before doing anything.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |