macOS High Sierra takes macOS Server away.
Apple TroubleshootingBackupmacbook

How to Share Folder as Time Machine Backup Destination in macOS High Sierra version 10.13.1

If you were using OS X Server in macOS Sierra then upgraded to macOS High Sierra, you are probably wondering what in the world happened to the Time Machine Option in OS X Server. A good discussion is going on about the question here, but we do have a solution for you:

As it turns out that Apple decided that Time Machine sharing will now become a part of macOS instead of Server 5.4. You can now used a shared Folder as a Time Machine backup destination using the Sharing preferences in your macOS System Preferences.

According to the Mac Help instructions, to Set up a shared Time Machine backup folder,

  1. Choose Apple menu > System Preferences, then click Sharing.
  2. Select the File Sharing checkbox.
  3. Click the Add button + at the bottom of the Shared Folders list.
  4. Navigate to and select the folder you want to use for sharing, then click Add.
  5. Select the name of the shared folder, click Options, then make sure “Share files and folders using SMB” is selected and “Share files and folders using AFP” is not selected.
  6. Control-click the name of the folder, then choose Advanced Options.
  7. Select “Share as a Time Machine backup destination.”
  8. If desired, select “Limit backups to,” then enter a size.
  9. Click OK.

The question remains, though, of how do you know your remote devices are currently being backed up or how much of their backup has been done and how much is left?

Advertisements
Apple TroubleshootingLittle Tipsmacbook

How to Show Hidden Files on Mac

To show hidden files and folders on Mac,

  • Launch Terminal
  • Type the following command then press Enter:
defaults write com.apple.finder AppleShowAllFiles YES

To hide the hidden files again, just type the same command but replace YES with NO as follows

defaults write com.apple.finder AppleShowAllFiles NO
  • After typing the appropriate command, look for your Finder icon (most likely on your Dock), then right-mouse click on it while holding the Option/Alt key of your keyboard. This will display a contextual menu from which you click Relaunch, to relaunch the Finder browser with your new visibility settings applied.

Now, if all you are looking for is how to display your Library folder in your user home folder, we have the steps in this short guide.

Apple TroubleshootingLittle Tipsmacbook

How to Show (Unhide) the Library Folder on Mac

To display your Library folder in your user home folder,

  • In Finder, go to your user’s home folder (usually similar to your username on the computer), then while you have that open in Finder,
    • go to the View menu in your menu bar,
    • click on Show View Options, then
    • in the new window that comes up, check the box next to Show Library Folder

That should make your Library folder visible among the other folders inside your user home folder.

Little TipsPythonWeb Development

Python, AttributeError: ‘module’ object has no attribute ‘config’

Four years ago, when I first started learning Python, I came across a problem that would later on become a “Famous Question” on StackOverflow. You may be reading this article because you encountered the same problem.

Traceback (most recent call last): File “C:\Users\myname\documents\visual studio 2010\Projects\PythonApplication 1\PythonApplication1\RunSikuliOnVM.py”, line 97, in logging.config.dictConfig(LOG_DICT_CONFIG_OnVM) AttributeError: ‘module’ object has no attribute ‘config’ Press any key to continue . . .

So, I will quickly suggest you check what turned out to be my problem.

I had imported a module into my code and later on made reference to that module by calling a specific attribute, but there was no such attribute in the module. Or at least so thought my Python interpreter. The quick fix for the error that I had gotten turned out to clear the cache of my interpreter. An example of how to do that with an interpreter is in the documentation for PyCharm.

This seems to be what is meant by the Python 3 documentation when it warns that “multiple evaluations of the same attribute reference may yield different objects.” I extrapolate and conclude that the error I am observing is somewhat of a “different” result I am getting.

Now for those interested in understanding the AttributeError for its own sake, another part of the Python documentation describes the exception in these terms:

exception AttributeError :Raised when an attribute reference (see Attribute references) or assignment fails. (When an object does not support attribute references or attribute assignments at all, TypeError is raised.)

 

The problem with the case at hand is that the config module does have a config attribute. This is why I posit that it is the caching issue that is the problem here since the interpreter may be referring to a totally different module than the logging module your code may be calling in this instance.

Note: This article is still in development even though it has been published to offer some beginning of a solution to those dealing with the AttributeError: ‘module’ object has no attribute ‘config’ exception.

Wi-Fi Protected Access II (WPA2) Vulnerability Paper
AntivirusMalwareModemsNetworkingRouters

Wi-Fi Protected Access II (WPA2) Vulnerability – All Your Wi-Fi Devices Might Need A Security Patch

UPDATE3: On a website dedicated to the “Key Reinstallation Attacks,” https://www.krackattacks.com/, the researcher who brought attention to this vulnerability describes what it is, presents a demo of the attack against an Android device as client, and suggests practical steps in a rich Q&A article.

UPDATE2: More companies have updates available. Microsoft also has released an update for client devices. (Source: Pileum Corporation)

If you have a Meraki access point, they have released a patch to address this issue. See below link for more information.
If you have an Aerohive access point, they have released a patch to address this issue. See below link.
SonicWALL has announced that their firewalls and access points are not vulnerable to the flaws in WPA2.
Cisco has released patches for some of their products that are affected. You can check for those products and updates as they are released here:
Microsoft has released a patch that provides additional protection on the client workstation. We recommend that this be installed on all workstations immediately.

UPDATE1: Several Wi-Fi AP manufacturers have started developing and releasing Updates. Please check the CERT website below for updates. One of the most recent ones is Meraki access point.

In a research paper titled “Key Reinstallation Attacks: Forcing Nonce Reuse in WPA,” Leuven, Belgium researchers Mathy Vanhoef and Frank Piessens just proved that WPA2 handshake traffic can be manipulated to induce nonce and session key reuse. Here is an overview of the announcement from CERT:

Wi-Fi Protected Access II (WPA2) handshake traffic can be manipulated to induce nonce and session key reuse, resulting in key reinstallation by a wireless access point (AP) or client. An attacker within range of an affected AP and client may leverage these vulnerabilities to conduct attacks that are dependent on the data confidentiality protocols being used. Attacks may include arbitrary packet decryption and injection, TCP connection hijacking, HTTP content injection, or the replay of unicast and group-addressed frames.

The simplest solution is to install updates provided by your Wi-Fi device vendor.

More on this here:

AntivirusMalwareWindows PC

CCleaner 5.33 and CCleaner Cloud version 1.07.3191 Under Malware Attack

In an article on their website, Piriform, a company recently acquired by Avast, published the following apology.

Dear CCleaner customers, users and supporters,

We would like to apologize for a security incident that we have recently found in CCleaner version 5.33.6162 and CCleaner Cloud version 1.07.3191. A suspicious activity was identified on September 12th, 2017, where we saw an unknown IP address receiving data from software found in version 5.33.6162 of CCleaner, and CCleaner Cloud version 1.07.3191, on 32-bit Windows systems. Based on further analysis, we found that the 5.33.6162 version of CCleaner and the 1.07.3191 version of CCleaner Cloud was illegally modified before it was released to the public, and we started an investigation process. We also immediately contacted law enforcement units and worked with them on resolving the issue. Before delving into the technical details, let me say that the threat has now been resolved in the sense that the rogue server is down, other potential servers are out of the control of the attacker, and we’re moving all existing CCleaner v5.33.6162 users to the latest version. Users of CCleaner Cloud version 1.07.3191 have received an automatic update. In other words, to the best of our knowledge, we were able to disarm the threat before it was able to do any harm.

Technical description
An unauthorized modification of the CCleaner.exe binary resulted in an insertion of a two-stage backdoor capable of running code received from a remote IP address on affected systems.

While more articles on this subject can be found on Spiceworks, a very commendable article about the incident was published by the The Thalos group who first discovered the breach into Avast’s servers.

Disk ManagementWindows PC

How to Restore Computer to Factory Settings Using Acer eRecovery

When a computer is dead because of software malfunction or operating system failure, there are numerous solutions that can be attempted. Ultimately one of the solutions is to restore the computer to its original state also known as factory settings. This article presents the steps for performing the factory restore using a special partition that comes on Acer computers (we have no affiliation with Acer, but just wanted to make this help note available. If your Acer Veriton computers have a recovery partition, you can launch the eRecovery tool by following these steps.

  1. Power down the computer. If necessary, you can force the computer to power down by pressing and holding the power button until all the lights are off.
  2. Power up the compter and then immediately press and hold the Alt and F10 keys on your keyboard.
  3. After a short moment, the should startup and offer you the choice of booting from a specified partition.
  4. Press enter and then follow the prompts after eRecovery is launched.

Once your system is up and running, you can consider restoring a backup of your system as long as you are sure you would not be reproducing the problem (e.g. putting an infection back on your computer).

Thanks!