Oct 26, 2018 This may be a single website, or, in the case of Apple’s iCloud or Google, this password may be the key that opens access to all sorts of personal data. Make sure the new password is secure; if your previous one wasn’t, take advantage of this warning to make sure the new one is harder to crack. Dec 06, 2016 10. Speed Up Your Mac with Purge and Activity Monitor. If your Mac is running slowly, you may need to free up some space. You can easily do this by opening Finder and choosing Applications Utilities Terminal. Once there, type “sudo purge” to free up around 500 MB of memory space and get your Mac back on track. Twitter accounts belonging to Joe Biden, Bill Gates, Elon Musk and Apple, among other prominent handles, were compromised on Wednesday in what Twitter said it believes to be an attack on some of.
One of the commonly touted advantages to using a Mac is that it’s more secure and less prone to malware than a PC running Windows. It’s easy to see where this attitude comes from: The prevalence of viruses and network attacks against Windows machines is greater by several orders of magnitude.
In fact, a recent Trojan horse hidden in a pirated copy of iWork ’09 that circulated on peer-to-peer file-sharing sites was big news because it was the first Macintosh malware to be widely circulated on the Internet (though there have been a handful of proof-of-concept malware iterations over the past few years). But the much lower rate of malware and network attacks isn’t proof that the Mac is immune to such things.
Indeed, there has been an ongoing debate over the years as to whether Mac users truly have more-secure machines or simply enjoy “security through obscurity” because they represent a relatively modest fraction of all computer users. While this debate will continue — and there are valid arguments on both sides — this article isn’t about that debate; it’s about a pair of simple questions: “How safe is your Mac?” and “How can you make it safer?”
The truth is that Apple Inc. does provide a pretty safe platform. The company leverages a number of advanced technologies to keep users and their data safe from harm. For a detailed list, see this Apple white paper (download PDF). But no system is perfect, and there are a number of security holes — many of them easily closed — that are common on Mac OS X systems. Here are 15 ways to fix the most frequently exploited security risks and protect your Mac.
Expert tips for savvy Mac management abound but here are some more that will help your machine become hack-proof.
Note: Unless we specifically say a tip applies only to Leopard, it should work with most recent versions of OS X, though the actual steps involved might vary somewhat.
Related stories:
Disable automatic opening of “safe” downloads in Safari
Probably one of the biggest Mac holes is in Apple’s Safari Web browser, which downloads files that you click on or that are embedded in a Web page. That presents a problem because, by default, Safari is designed to open “safe” files as soon as they’ve been downloaded. Unfortunately, the definition of “safe” includes package-installer and disk image files, which can contain malware. If the malware files are embedded in a Web site, they could be downloaded and opened automatically.
Apple has done a good job of combating the potential damage in Mac OS X Leopard, which automatically detects disk images and applications that have been downloaded from the Internet via Apple’s applications (Safari, Mail and iChat). However, to be truly safe, one of the best and easiest things you can do is disable the automatic opening of such files in the Safari preferences.
Disable automatic opening of downloads.
From the Safari menu in the menu bar, select Preferences, click the General tab, and uncheck “Open ‘safe’ files after downloading.” From now on, you’ll need to manually open downloaded files by double-clicking them in your Downloads folder or in Safari’s list of downloaded items.
Make sure not to click the “Do not show” option in the warning dialogs that Leopard displays when you open downloaded files; that way, you’ll always be warned the first time each downloaded item is opened. (Note: This tagged file feature was introduced in Leopard and doesn’t apply to earlier versions of Mac OS X.)
A similar security feature in Leopard is support for code signing, which places a digital signature in application files; your Mac checks them at launch to be sure that they haven’t changed and alerts you if they have. Although many third-party applications don’t yet support this, it is a powerful feature, and you should pay attention to any such warning. As with the tagging of downloaded files, do not click the “Do not show option” if you do see one of these alerts. Install antivirus software
The limited number of viruses that target Mac OS X often leads Mac users into a false sense of security. Although there are few Mac viruses out there now, that doesn’t mean there will never be a virulent form of malware that threatens the Mac. And the lackadaisical approach of assuming that Macs can’t be infected by a virus increases the chances of widespread infection and damage when (not if) such a virus is developed and released into the wild of the Internet.
Besides, even if it doesn’t affect you directly, you might receive and inadvertently pass on a Windows-specific virus. The most common of these are macro viruses found inside Office documents — some of which have a limited ability to affect machines with a version of Office for Mac that has macro support enabled.
Finally, if you are running Windows — either in a dual-boot configuration with Apple’s Boot Camp or under a virtualization tool such as Parallels Desktop — your Mac is just as susceptible to viruses as any PC. In fact, if you have a Windows operating system on your Mac, you should really consider virus protection for both Mac OS X and Windows.
When it comes to antivirus programs for the Mac, a good open-source option is the Unix-based ClamAV (which works with Mac OS X but is command-line based) and its Mac graphical user interface port ClamXav.
If you want a more full-featured commercial offering that provides constantly running protection, check out Intego’s VirusBarrier ($70 for one device; $200 for up to five devices), Sophos Anti-Virus SBE (variable pricing depending on number of users and years of service, beginning around $45 for a single license or $190 for five users), Norton AntiVirus from Symantec Corp. ($50 for one user) or McAfee Inc.’s VirusScan ($37 per device for up to 25 devices).
[Visit Intego’s Mac Security Blog.]
Don’t allow remote guest access or enable Leopard’s guest account
Macs have always supported guest access for file sharing, in which a remote user can connect to a Mac without providing a username, password or other identifying information. The idea of allowing remote access to your Mac has always been fraught with potential for security compromises. It should never be allowed because it presents a grave security threat that could prevent you from easily tracking the source of a breach.
In Leopard, Apple extended guest access to the local level: Users can log in and use a Mac with a guest account that requires no username or password. The idea of a guest account is a convenient one. If you have friends or family visiting, you can let them use your Mac without allowing them access to your user account or files. When they log out as a guest, their home folder and any files they created are automatically deleted.
There are, however, some system directories, such as the Unix /tmp directory, that the guest account can write data to that may or may not be deleted at logout (or forced restart). The guest also has access to any installed applications, which could be used to perform malicious actions from your computer. If you must use the guest account, limit its access using Parental Controls.
Hack My Mac Make It Faster Tag Ever Seen
Disable the guest account.
You can turn off both the guest account and remote guest access in the Accounts pane of System Preferences in Leopard. Select Guest Account on the left, then uncheck both “Allow guests to log into this computer” and “Allow guests to connect to shared folders.”
If you’d rather keep the guest account but limit its access to files and apps, keep “Allow guests to log into this computer” checked and click the Open Parental Controls button for options.
Use secure passwords
User passwords are one of the foundations of security. If you use a password that is simple or easy to guess, you’re just asking for someone to break into your computer or user account.
Mac OS X includes a password assistant that automatically generates random passwords according a specified level of complexity; it also checks the complexity of passwords that you create. Make use of this feature whenever you need to generate a password — for Web sites or other services as well as for your Mac OS X user account.
To get to the password assistant, go to the Accounts pane in System Preferences, select a user account, click the Change Password option, and then click the button with a key icon next to the New Password field.
The password assistant can create secure passwords. Click to view larger image.
Even the most complex password can be cracked, however, so remember to change your password frequently. If you don’t trust yourself to remember, try setting a monthly reminder in iCal.
Disable automatic log-in
As part of the Setup Assistant that runs when you install Mac OS X or start up a new Mac, Mac OS X enables automatic log-in for the first user account that you create — which means you can log in without providing a username and password whenever you start up.
While automatic log-in is convenient, particularly if you’re the only user of your Mac, it also means that anyone who has physical access to your Mac can simply restart it to gain full access to your account and your files. This is a particularly significant risk for Mac laptop users.
You can disable automatic log-in in the Accounts pane of System Preferences by clicking the Login Options button at the bottom of the user accounts list on the left. The automatic log-in option appears at the top of the area on the right; select Disabled from its pop-up menu.
Don’t display usernames or password hints at log-in
By default, Mac OS X’s log
-in window displays a list of all users on a Mac (or all users who can access a Mac in a network). This makes it easier for anyone who has physical access to a Mac to gain access to it, since they need only guess a password. Disabling the display of users adds another layer of security because it requires that a malicious user know the username associated with an account.
Another simple act to help secure an account is to disable password hints (which Mac OS X will normally display to help you remember your password after three failed log-in attempts). This significantly undermines the security of using a password and should always be disabled.
Both of these options can be configured in the same Accounts pane where you disabled automatic log-in. To disable password hints, simply uncheck the box next to “Show password hints.” To choose not to display usernames in the log-in window, select the “Name and password” radio button next to “Display log-in window as,” which means users will have to type both a username and its password to log in.
Set a firmware password
The biggest security risks occur if your Mac is stolen or physically compromised. Even if thieves can’t log into your account, they can gain access to the data on your Mac using one of the many special start-up modes built into all Macs, such as booting from an install DVD and resetting your password, using Target Disk Mode to make your Mac act as an external hard drive, or booting into the Unix-style Single User Mode.
You can, however, place a firmware password on your Mac. This password is written into the firmware chips on the Mac’s motherboard using either the Open Firmware standard on PowerPC Macs or Extensible Firmware Interface (EFI) on Intel Macs. Regardless of platform, the free tool from Apple for implementing a firmware password is called the Open Firmware Password Utility. Apple provides complete steps for setting a firmware password on its support site.
If you or anyone else tries to use a special start-up mode, the user will be required to enter the firmware password. This can significantly secure personal, business or educational Macs against tampering. However, be warned that if you forget a firmware password, there is no way to reset or remove it.
Use the Security pane options in System Preferences
The Security pane in System Preferences offers Mac users a number of simple but powerful options for securing their systems — requiring a password for waking from sleep or a screensaver, disabling automatic log-in (and thus requiring authentication at start-up), requiring an admin account username and password to modify settings in System Preferences, automatically logging out after a period of inactivity, and disabling the use of Apple’s infrared remotes with the computer or pairing the computer to only one specific remote.
Make use of Security pane options.
Each of these can go a long way to securing access to your data if someone has physical access to your Mac. This is particularly important if you have a Mac laptop or are working with a Mac that offers any form of public access.
The option to use secure virtual memory is also located here. When secure virtual memory is enabled, the swap file that a Mac uses to store running data if it begins to run short of RAM will be encrypted. This drastically reduces the chance that if a Mac is physically compromised, any data for active applications or processes will be retrievable. This is important because virtual memory may contain sensitive information that can be used to compromise a Mac even if data on a drive is secure.
Disable unused network interfaces
If you look in the Network pane of System Preferences, you’ll notice that most Macs include multiple network interfaces, such as Ethernet, AirPort/802.11, FireWire and Bluetooth. In theory, any active network interface could be used to access your Mac in a remote attack — particularly wireless technologies, which don’t require a physical connection to a network.
For this reason, it’s a good idea to disable any interfaces you’re not using to connect to a network or the Internet. To do so, launch System Preferences, and select the Network pane. Select each interface you want to disable, and for each one, select the button that looks like a gear at the bottom of the interface list, and choose Make Inactive from the pop-up menu.
This disables the interface, but doesn’t delete it — so you can easily change it back to Make Active to restore access to the interface.
Make use of encryption options
Mac OS X offers a number of options for encrypting your data to prevent access to it if your Mac is lost or stolen. I’ve already touched on a couple of these, but the biggest example is FileVault, which can also be activated and managed from the Security pane in System Preferences.
FileVault converts your entire home folder into an encrypted disk image. The image is mounted and accessible only when you are logged in. At all other times, it is unreadable. FileVault uses industry-standard encryption, and if you use Time Machine, any backups of your home folder’s contents are equally encrypted.
Note: FileVault must be enabled by each user who wants to have an encrypted home directory. Each home directory will be encrypted as a separate disk image file.
FileVault supports the use of a master password as a safety net that can be used to reset user passwords and access encrypted home folders if users forget their passwords. If both a user password and a master password are lost or forgotten, however, there is no way to retrieve data from the encrypted home folder.
To enable FileVault, launch System Preferences, select the Security pane, and then select the FileVault tab. You can set or change a master password using the Change button next to the master password description. (You must be an administrative user of the computer to do this, and you must know the current master password if one is already set.)
Next, click the Turn On FileVault button. Enabling FileVault for the first time can take a significant amount of time because the entire contents of your home folder are copied into a newly created encrypted disk image. If you have tens or hundreds of gigabytes of data, this could take hours or even days (much like an initial Time Machine backup).
For this reason, it’s easiest to set up FileVault when you first create a user account (and thus there is little data in the home folder). During this initial copy, you will also need to ensure that you have at least as much free space on your hard drive as the size of your home folder, since all the data will be copied. Once enabled, FileVault encrypts and decrypts items on the fly when you log in or log out, and it generally won’t slow down performance significantly.
Disk Utility also lets you create encrypted disk images. Disk images look and act like virtual hard drives and can be created as blank images or copies of existing disks or folders. Mounting an encrypted disk image and accessing the contents requires a password. This makes encrypted disk images helpful if you want to secure only a portion of your files, if you need to securely store files outside your home folder, or if you need to securely share files by e-mail or other mechanisms.
To create an encrypted disk image, launch Disk Utility, and click the New Image button in the tool bar. You can select the size, name (which will be displayed as a disk/volume name when image is mounted), file name and location of the image file itself, and various other disk format options (which can typically be left as their default selections). To enable encryption, choose 128-bit or 256-bit AES encryption from the Encryption pop-up menu.
After you’ve made your selections, click the Create button. When Disk Utility creates the image, it will prompt you to enter and verify a password that will be required to open the disk image file. The password assistant is available in this prompt (in the form of a button with a key icon, just as when changing a user account password).
Use Keychains wisely
The Mac OS X Keychain is a feature that securely collects passwords for a vast number of functions — including e-mail and instant messaging accounts, Web services, Wi-Fi networks and file servers. The Keychain stores this information in encrypted format and is decrypted only when you provide a master password.
Keychains can also contain encrypted notes (such as bank account information) and security certificates, all of which can be accessed and managed from the Keychain Access application in the Utilities folder on your Mac. In the Keychain Access window, right-click or control-click on an available Keychain to change the password, lock the keychain or alter settings that will cause the keychain to lock automatically. You can also create or delete Keychains here.
By default, each user account has a Keychain associated with it that is unlocked with the user’s password at log-in. If a user’s password is reset through a method other than the Accounts pane in System Preferences (such as by an administrator account or from the Mac OS X Install DVD), the account and Keychain passwords will become out of sync. You can fix this by manually changing the Keychain password to match your log-in password, or you can reset the Keychain using Apple’s Keychain First Aid feature, which can also help troubleshoot other types of Keychain problems.
Keychains offer both security and convenience. You can improve security by using multiple Keychains (each of which contains different information) with different passwords or by simply changing your account’s Keychain password. This ensures that even if your user account password is compromised, the data in your Keychain(s) — including passwords to other services — will remain securely encrypted. As with a firmware password, if you forget a Keychain’s password, its contents will be irretrievable.
Get the most out of Leopard’s firewall
Mac OS X has included an optional firewall for some time, traditionally based on the open-source Unix ipfw firewall. Leopard introduced a newer, dynamic firewall option. This new firewall (click the Firewall tab in the Security pane in System Preferences) is straightforward, which is helpful for users who simply want their computers protected without having to create and manage complex firewall rules.
You can choose to block all incoming traffic, which prevents your Mac from accepting any data that it didn’t explicitly request, such as a Web page. You can also allow only core system services to accept incoming data or allow access based on specific applications or system processes.
This last option is the most commonly used, and it will cause Leopard to alert you any time an application wants to accept nonrequested incoming data. If you allow incoming data for an application, it gets added to the list of allowed applications. Applications such as iChat require incoming connections to function properly.
You can use the list in System Preferences to selectively remove applications from the allowed list or even just as a quick way of verifying which applications are on the list. You can also change an allow rule into a block rule, which will prevent an application from receiving incoming data or asking you to allow access.
Two other options — enable logging and enable stealth mode — are available via the Advanced button. Logging, as you might guess, logs all traffic that is received by your Mac and how that traffic is filtered. Stealth mode will cause your Mac to ignore ping requests from other computers and prevent outside users from easily detecting your Mac on a network. This increases security but can also limit the effectiveness of remote troubleshooting of network problems.
Leopard’s new dynamic firewall interface is really a simple way to establish basic firewall rules. Connections are still evaluated based on the network port numbers used by each request, but the firewall has been made much simpler for everyday users to enable and configure. For power users, the full ipfw suite, which lets you develop much more complex firewall rules, is still included as part of Leopard and can be accessed via the Terminal. And as with any computer, you can use port-scanning tools to verify the effectiveness of your firewall configuration in shielding your Mac.
One reason to understand and use the firewall is the common use of public Wi-Fi networks. Such networks are often unprotected, meaning that any data you exchange over the network can easily be snooped on. However, it also means that any malicious user connected to the same network has the capacity to port-scan your Mac and attempt to determine vulnerabilities. Working with the firewall and enabling stealth mode are two good ways to protect your Mac in these situations.
Delete files and erase disks securely
While you may think that you’re permanently deleting files when you empty the Trash or erase a disk using Disk Utility, the truth is that you aren’t. You’re really just marking the disk sectors where files were stored as available to store new data. Until the disk space occupied by the “deleted” files is overwritten at least once, many hard drive recovery and forensic tools can recover deleted files.
Fortunately, Macs offer a couple of ways to ensure that deleted data stays deleted. First up and simplest is the Secure Empty Trash command, located just under the normal Empty Trash command in the Finder’s File menu. This performs a simple overwrite of the disk sectors containing any files being trashed. In some instances, serious forensic investigators could reconstruct files that have been overwritten with a single pass, but for most users, this option offers ample security by preventing easy recovery of deleted items.
If you really want to ensure that items can’t be recovered, Disk Utility’s secure-erase features allow you to erase an entire disk or the free space of a disk, which includes both disk space that was never used and space where files had existed before being deleted.
Whether you’re erasing the entire disk or just the free space, you can choose to securely erase data with a single pass of blank data (also known as zeroing out a disk), seven passes or 35 passes. A seven-pass erase meets U.S. Department of Defense standards for secure data removal; a 35-pass erase typically takes hours or days to complete but will ensure that nothing is recoverable. When erasing an entire disk, click the Security Options button to choose the number of passes; when erasing free space, click the Erase Free Space button to see these options.
To use either feature, select the hard drive or volume that contains data you want to erase securely in the list to the left of the Disk Utility window, then select the Erase tab on the right side. If you want to erase only free space, click the Erase Free Space button.
To erase an entire disk/volume, click the Security Options button, select the number of passes to be made, and choose the appropriate disk format and the name for the newly erased disk. Then click Erase to erase the disk. (Note: You can’t erase the start-up disk that a Mac is using — if you want to securely erase the primary/startup drive, you’ll need to boot from an alternate disk, such as an external hard drive or the Mac OS X Install DVD.)
Don’t share anything you don’t have to
Macs offer users a lot of ways to share information. The Sharing pane in Leopard’s System Preferences offers 11 different choices (though one them, Xgrid computational cluster sharing, isn’t likely to be used by the majority of people).
The list ranges from general file and printer sharing to remote log-in and control of your Mac using Leopard’s screen sharing, Apple Remote Desktop, and secure shell (SSH) command-line access. Even personal Web site hosting (Internet sharing) and Bluetooth sharing are supported, as are Remote Apple Events, which allow applications on one Mac to trigger actions on another.
The simple advice here is “Don’t enable any type of sharing you’re not actively using.” Every time you enable sharing of any service, it opens up an avenue for someone to remotely access and/or manipulate your Mac. This could mean accessing shared files or taking complete control of the computer. If you need to share something, then by all means do so — but if not, keep everything as locked down as you can.
Another danger is the Back to My Mac service offered by Apple’s MobileMe, which lets your MobileMe account automatically connect you to your Mac using file, printer or screen sharing over the Internet. This is a highly convenient feature, but not only does it rely on leaving sharing services running and open; it also relies on making those services accessible from the Internet at large. If your MobileMe account is compromised, then so is your entire Mac.
If you need to enable sharing, and chances are that you will at some point, do it in as restrictive a manner as possible. Virtually every sharing service offers at least minimal controls. In the case of DVD and CD sharing, you can opt to have your Mac ask you before allowing remote access. In the case of many services that are user-based, you can choose which users are allowed to access the service remotely.
Keep sharing locked down.
Most importantly, in the case of file sharing, you can designate both which folders are shared and who has access to those folders. Even though the default setting is to allow all users access to the general Shared folder and to allow everyone access to the Public folder inside each user’s home folder, you can add and remove specific folders from the list of those being shared. Share only what is needed, and limit access to as few users as possible.
Also, keep in mind that anyone connecting to a remote Mac using an administrative account will be able to mount not just the explicitly shared folders, but any connected hard drive. This is another reason to disable file sharing if it isn’t needed and to be sure you use good password policies for admin users. (It’s also a good reason to create administrative accounts with names other than “admin” or “administrator.”)
On a final note about file sharing, Mac OS X supports file sharing with three different protocols: AFP (the native file-sharing protocol for Macs), SMB (the native protocol for Windows) and FTP. You can select which ones to enable using the Options button in the Sharing pane in System Preferences.
SMB must be enabled for individual users because it stores passwords in less secure form on your Mac (though it still encrypts their transmission over the network). FTP should be avoided because it offers no encryption whatsoever. Again, limit the protocols to those you need, and leave the others disabled.
Disable Bonjour
Bonjour is Apple’s zero-configuration networking system that allows Macs (and PCs and iPhones) to automatically broadcast resources they are sharing over a network and to discover resources shared by other devices. Bonjour can be used for file sharing, printing (many printers ship with Bonjour built in), sharing of iTunes libraries, instant messaging without the use of an IM service, and many other things.
Since Bonjour works by your Mac broadcasting its presence and its available shared resources, it can easily alert malicious users not only to its location, but also to vectors that can be used to target it for attack. Most applications that support Bonjour also allow you to disable Bonjour broadcasting, though you may need to dig around in their Preferences to find the option.
As with sharing services, if you don’t need Bonjour for an application, turn it off. If you want to see which applications on your Mac are actively advertising themselves using Bonjour, check out the open-source Bonjour Browser, which lists the various Bonjour services actively running at any one time. You can use this to determine which applications to disable Bonjour support in. (One of the most common is iTunes, which uses Bonjour to share libraries, locate/sync to Apple TVs, and remotely control Apple’s Remote application for the iPhone and iPod Touch.)
You can even go a step further from the command line, where you can disable Bonjour as a whole. Ali Karbassi provides instructions on his blog.
Keep your software up to date
The most important security option available to Mac users is keeping software up to date. This applies to Mac OS X itself, Apple-branded applications and any third-party apps on your system. Maintaining an up-to-date operating system and application set means that publicly known vulnerabilities are more likely to have been patched in the software on your system.
The Mac’s built-in Software Update feature checks for updates to OS X and Apple applications on a weekly basis by default, and it notifies you when updates are available — which lets you choose whether to download and install them all immediately or to wait until a later time.
You can also choose to check monthly or daily, or disable automatic checking altogether (not recommended), using the Startup Disk pane in System Preferences. Another option is to have critical updates such as security updates downloaded automatically; you’ll be informed when the download has been completed and is ready for installation.
The Software Update pane also lets you check for updates at any time (which can also be done via the Apple menu) and view a list of updates that have been installed on your Mac.
Most third-party apps include an option to check for updates each time they are launched. This should be left enabled because updates often improve performance, stability and security. VersionTracker Pro ($30 for up to three Macs) and the free App Update Dashboard widget are two utilities that can help ensure that all applications on your Mac are up to date.
Additional resources
Correction: The article originally referred to the “iServices.a” malware as a virus; it is a Trojan.
Ryan Faas is a frequent Computerworld contributor specializing in Mac and multiplatform network issues. You can find more information about him at RyanFaas.com. http://ryanfaas.com/
Source: Computerworld
This tip replaces version 2126 originally released on the Discussions Feedback forum.
Find the serial number on:
Plug your serial number in at this link:
Do not use third party links as they may not be secure.
Do not post the serial number on this board, as that is your key to any support you may have left.
Use this tip also to help figure out which portion of the Support Community to post in, as this tip explains:
When you have no serial number, use one of these third party sites to find your model, production year, time in year
(early, middle, late, summer, fall, winter, spring):
Microsoft outlook email for mac free download.
Note:
PowerMac, PowerPC, eMac, iMac PPC, iBook (Apple recycled the name iBook for its eBook application on new Macs and iOS devices), Powerbook, Classic all refer to Macs that are older than the present series
of Macs. Posting in those forums about a current Mac, shows you have not researched your Mac sufficiently to get a succinct answer to your query. Apple menu -> About This Mac will tell you the Mac OS version or System version you are running. The X in the version is important, and so is the preceding 10 in the version if it exists.
Questions saying X.1 could refer to Mac OS X 10.13.1, 10.1. Don't truncate the version you see.
There are no iOS forums specific to the operating system found on iPads, iPod Touch, AppleTV, Apple Watch, and iPhones. Figure out the type of portable device you are running to ask a question about that device specifically.
Apple has these identifying articles as well:
http://support.apple.com/kb/ht3255 - MacBook Air
http://support.apple.com/kb/ht1635 - MacBook
http://support.apple.com/kb/ht4132 - MacBook Pro
http://support.apple.com/kb/ht3476 - Mac Mini
http://support.apple.com/kb/HT6069 - Mac Pro
http://support.apple.com/kb/ht1758 - iMac
http://support.apple.com/kb/sp96 and http://support.apple.com/kb/sp37 - PowerMac G5
http://support.apple.com/kb/TA25585 and http://support.apple.com/kb/ht3082 - PowerMac G4
http://support.apple.com/kb/TA22033 - PowerMac G3
http://support.apple.com/kb/ht3065 - Powerbook G4
http://support.apple.com/kb/ht2395 - eMac
http://support.apple.com/kb/ht2287 - Powerbook G3
http://support.apple.com/kb/ht1772 - iBook
Macs generally will not run an older Mac OS X operating system than shipped with them.
The one exception is virtualizing 10.6 Server on 10.7 or later, which is described later.
Also important to note is that the Apple App Store only has 10.7, 10.8, and 10.12, except for those who purchased in between systems, and have a Mac that shipped with in between systems. For all others if you need an in between system, and your Mac is older, contact the App Store tech support.
A quick upgrade guide has been posted on
These dates are important for recognizing what Mac OS X will run on Macs. Macs released on or after (including their model #s or name
where known):
September 30, 2018 will only run 10.14 or later
• MacBook Air 8,x
• Mac Mini 8,x
September 25, 2017 will only run 10.13 or later.
- iMac Pro 1,1
- MacBook Pro 15,x (2018 model)
June 5, 2017 Mac models (all 2017 Models except iMac Pro) will only run 10.12.5 or later
• MacBook Pro 14,x
• MacBook Air 7,2
• MacBook 10,1• iMac 18,x
September 20, 2016 will only run 10.12 or later.
- MacBook Pro with touchbar (instead of physical F keys)
- MacBook Pro 13,x
- iMac 18,x
- MacBook Air 7,2 see this article on which ones could only run 10.12 or later.
September 30, 2015 will only run 10.11 or later. These Macs are the first Macs that can be upgraded directly to
Mac OS 10.14 without installing any other software.
- iMac 16,x and 17,x
- Macbook 9,x (these Macbooks came with the USB-C, instead of the USB 2 or USB 3 connector. USB 3 and 2 look identical on the outside, use System Profiler to determine which you have)
October 16, 2014 will only run 10.10 or later (10.10 is only available for Macs that shipped with it).
- MacBook Air 7,1 and 7,2 (some models could only run 10.12 or later).
- Mac Mini 7,x
- iMac MF885LL/A came with 10.10.2. All other 15,x came with 10.10.0
- MacBook 8,x - the oldest that can run Mac OS 10.14 with this model name after installing 10.11 or later.
- MacBook Pro 11,4 and 11,5
October 22, 2013 will only run 10.9 or later (10.9 is only available for Macs that shipped with it).
- Macbook Pro 11,1 through 11,3
- Mac Pro 6,x
- MacBook Air Early 2014
- Mac Mini 6,x
- iMac 14,4
Make It Faster Lyrics
June 25, 2012 will only run 10.8 or later. 10.8 through 10.11 are supported by these Macs [indicate machine ID found in profiler], and newer models may run some variety of 10.9, 10.10, or 10.11):
- MacBook Pro with Retina EMC 2557 from 2012 and 2013 and later models.
- MacBook Air (2013 or newer) [6,1]
- MacBook Air (Mid 2013 or newer) [6,1]
- Mac mini (Late 2012 or newer) [6,1] - the oldest that can run 10.14 after installing 10.11 or later.
- iMac (Late 2012 or newer) [13,1]
- Mac Pro (Late 2013) [6,1]
These models above are the first models that can be upgraded directly to High Sierra 10.13 without other prior upgrades.
The oldest MacBook Air and iMac that can run Mac OS 10.14 after installing 10.11.
• MacBook Air 5,1
• iMac 12,1
These Macs which are older can also be upgraded to 10.12 by upgrading to 10.7.5 first, and 10.13 by upgrading to 10.8 first:
- MacBook (Late 2009 or newer) 6,1
- MacBook Pro (Mid 2010 or newer) 6,1
- MacBook Air (Late 2010 or newer) 3,1.
- Mac mini (Mid 2010 or newer) 4,1
- iMac (Late 2009 or newer) 10,1
- Mac Pro (Mid 2010 or newer) 5,1
The Macs are compatible with 10.8 and later from prior 10.8's release
- Mac Pro (Early 2008 with AirPort Extreme card, or Mid 2012) [3,1]-[5,1] (Earlier Mac Pros are discussed on the 10.8 upgrade tip).
- MacBook Late 2008 [5,1] to mid 2010 [7,1] with no Pro or Air in the name.
- iMac (Early 2009 to mid-2011) [9,1] to [12,1]
- Mac mini (Mid 2010 to mid 2011) [4,1] to [5.1]
- MacBook Air (Late 2010 to mid-2012 [3,1]-[5,2]
- MacBook Pro Late 2008 [5,1] to Retina 2012 that are not EMC 2557.
July 20, 2011 will only run 10.7 or later. The model IDs (x,x) and EMC that fit this description until June 25, 2012 release of 10.8 (excluding the ones which will run only 10.8 or later earlier mentioned) :
iMac of an EMC of 2496; 13,x and later.
Mac Mini 5,x and later.
Macbook Air 4,x and later.
MacBook 8,x and later (no Pro no Air in the name)
Mac Pro 5,1 with EMC 2629 - the oldest that can be have Mac OS 10.14 installed after installing 10.11 or later, those without that EMC number came with 10.6 and can also be updated to 10.14 the same manner; 6,x and later.
MacBook Pro with EMC 2555, 2563; 9,x and later.
Note all the Macs that can only run 10.7 and later, may be able to run 10.6 Server with Parallels, if you need compatibility with an older operating system:
Beyond this point Macs released during certain date ranges also have a maximum operating system, and/or
minimum retail operating system and system specific operating system requirement (when I say up to 10.9 that includes all incremental updates):
Note: images shown below for retail operating system are those that have no 'Update, Dropin, or OEM' wording on them.
March 15, 2010-July 19, 2011 will only run prebundled 10.6 installer disc, and not retail, but also able to be upgraded to 10.9. Note this tip
if upgrading to 10.7 or later: https://discussions.apple.com/docs/DOC-6271
August 28, 2009-March 14, 2010 will only 10.6 or later up to 10.9. And will at minimum be able to use
10.6.3 retailto install 10.6. Note this tip if upgrading to 10.7 or later: https://discussions.apple.com/docs/DOC-6271
During 2000 to 2009, the serial number also made it easier to identify the Macs, as the 3rd, 4th, and 5th character of the serial number referred to the week
and year of the shipment date. Thus for serial numbers where x can be any letter or number, xxABCxxxxx serial numbers would refer to an A which is the last digit of the year, and BC=week of the year. xx905xxxx is the fifth week of 2009. You can then use Wikipedia to figure out what date the release was, and if it was after a specific retail release of an operating system to determine which pre bundled disc it came with, and which later retail discs the Mac could work with.
December 15, 2008-August 28, 2009 will only run prebundled 10.5 installer disc, and 10.6 retail https://discussions.apple.com/content/attachment/43236040snow.jpg, and if on https://discussions.apple.com/docs/DOC-3761
will also run up to Mac OS X 10.11 if you follow this tip: https://discussions.apple.com/docs/DOC-6271
October 28, 2007 -December 14, 2008 will at minimum be able to use the 10.5.6 retail, and install up to 10.9 if included on https://discussions.apple.com/docs/DOC-3761 if you follow this tip https://discussions.apple.com/docs/DOC-6271
January 10, 2006-October 27, 2007 will at minimum be able to 10.5 retail, and if
on Which 10.5 systems can upgrade to 10.8 or 10.9?or Are there 10.4 systems that can upgrade to 10.8 or 10.9? are
able to run 10.9. Core2Duo and Xeon can upgrade to a minimum of 10.7.5. Otherwise if they only have a CoreDuo, CoreSolo Intel
processor only be able to upgrade to Mac OS X 10.6.8. G5, G4, and G3 processors are not Intel.
Earlier dates are covered on this tip:Can I download my Mac OS upgrade?
Using the dates from the above documents, and the dates according to Wikipedia when specific retail
operating system systems were released, you can find which retail releases were newer than the Macs and the ones immediately older.
i.e.:
An October 24, 2011 Macbook Pro will only run 10.8 retail, and 10.9 retail downloads, but needs an
AppleCare requested 10.7 installer to install 10.7. An exception exists in 10.6 Server, as indicated here:
A pre-October 26, 2007 MacBook Pro will only run the system specific Mac OS X 10.4 installer
that shipped with it, which can be ordered from AppleCare, or newer retail installer versions
of 10.5, 10.6 compatible with its hardware, and 10.7 if it is at least a Core2Duo.
CoreDuo, nor is CoreSolo is not compatible with 10.7.
For PowerPC Macs, Mac OS X 10.4.11 and earlier offer Classic compatibility, and on certain 2003 and earlier Macs dual booting on Mac OS X 10.5 & Mac OS 9:
No Mac may run an older version of Mac OS 9 than was prebundled with it.
A more precise timeline of Mac OS X follows (in U.S. date notation. Links to relevant articles up to 10.7 are included, as 10.7 drops PowerPC applications on Intel):
4/8/2015 10.10.3 (with supplemental on 4/16/2015)
1/27/2015 10.10.2
11/17/2014 10.10.1
10/16/2014 10.10 Yosemite
9/17/2014 10.9.5
6/30/2014 10.9.4
5/15/2014 10.9.3
2/25/2014 10.9.2
10/22/2013 10.9 (10.9 & 10.9.1 should be skipped due to security issues) Mavericks
10/3/2013 10.8.5 supplemental update
9/25/2013 10.8.4 iMac Late 2013
6/10/2013 10.8.4 MacBook Air mid 2013
6/4/2013 10.8.4
3/14/2013 10.8.3
11/29/2012 10.8.2 Mac MIni Late 2012
10/4/2012 10.8.2 supplemental update
10/4/2012 10.7.5 supplemental update
8/23/2012 10.8.1
7/25/2012 10.8 Mountain Lion
5/9/2012 10.7.4
2/1/2012 10.7.3
10/12/2011 10.7.2
8/16/2011 10.7.1
7/25/2011 10.6.8 v1.1
5/4/2011 10.6.7 Early 2011 MacBook Pro
3/21/2011 10.6.7
1/6/2011 10.6.6
11/10/2010 10.6.5
6/15/2010 10.6.4
4/13/2010 10.6.3 v1.1
4/1/2010 10.6.3 retail installer presently sold at the online Apple Store.
8/28/2009 10.6 retail installer (Snow Leopard)
12/15/2008 10.5.6 retail installer (Last PowerPC installer)
6/30/2008 10.5.4 retail installer
11/15/2007 10.5.1 retail installer
10/26/2007 10.5 retail installer (Leopard)
8/7/2006 Mac Pro (Intel, first Snow Leopard compatible professional desktop) replaces PowerMac G5 (the last PowerPC Mac and Mac capable of running Classic)
5/16/2006 The MacBook replaces the iBook (the last consumer notebook capable of running Classic)
4/3/2006 10.4.6 retail PowerPC only.
2/28/2006 First Intel Mac Mini (not capable of running Classic, first Mac)
1/10/2006 First Intel iMacs, MacBook Pro replaces Powerbook (first Macs not capable of running Classic, first Mac capable of running Snow Leopard)
10/31/2005 10.4.3 retail PowerPC only.
8/9/2004 10.3.5 retail
12/17/2003 10.3.2 retail
12/19/2002 10.2.3
Some hints about operating systems:
- Mac OS X 10.8 or later are required to sync with iOS 9.2 or 9.2.1.
- No PowerPC Mac can run Mac OS X 10.5.8 or higher, or sync with iOS 6 or higher.
- No PowerPC Mac can run Boot Camp
- No Mac can run Classic (side by side Mac OS 9 with Mac OS X without reboot) on the same partition as Mac OS X 10.5 or higher.
- No Intel Mac can run Classic.
- All Intel Macs can run at least Mac OS X 10.6.8 as long as they are older than Mac OS X 10.7's release.
- PowerPC applications need Mac OS X 10.6.8 or earlier to run on Intel Macs.
- Boot Camp needs Mac OS X 10.5 or later on Intel Macs. Note other virtualization tools are available for Mac OS X 10.4.11 or earlier on Intel Macs.
- Mac OS X 10.7.3 is needed for the latest Java and minimum iCloud.
- The same minimum system requirements exist for Mac OS X 10.8, 10.9, 10.10, and 10.11.
- 10.6.6 is the minimum for the Mac App Store, and upgrading to 10.7 without erasing the drive you install 10.7 on if the hardware supports it.
- 10.6.8 is the minimum for 10.8 or later upgrades if the hardware supports it.
- Apple has a 10.6.8 to 10.11 updateon the App Store.
- Some Macs that shipped with 10.6 can install up to 10.12 if they are upgraded to 10.7.5 first.