leichter
About
- Username
- leichter
- Joined
- Visits
- 5
- Last Active
- Roles
- member
- Points
- 10
- Badges
- 0
- Posts
- 7
Reactions
Comments
-
A possibility - no way to know if it's true - is that Apple quickly discovered a way to determine if anyone was making use of this hack and monitored it on their servers. As long as the only one using it was the guy who found it, there would be no …
-
The Terminal command shown is backwards! The syntax is: ln -s So what you should be typing is: ln -s ~/Library/Application\ Support/MobileSync /Volumes/Sierra/BackupiPhone/Backup/ By the way, spaces in the link name are perfectly OK -…
-
@Jslove: Smart Mailboxes can be combined: All you have to do is have a Smart Mailbox defined as messages "in " (or "not in "). So you can, in fact, create a smart mailbox whose contents are defined by any arbitrary Boolean combination (i.e., comb…
-
@Emaven: All the rules are in a couple of plist files in ~/Library/Mail/V3/MailData/. I think MessageRules.plist is the old file, while there are two new files, SyncedRules.plist and UnsynchedRules.plist. It's never been entirely clear to me what…
-
A very different product with a similar purpose is HistoryHound - http://www.stclairsoft.com/HistoryHound/index.html HistoryHound is limited to your browser history, not everything you've seen anywhere. It indexes the contents of everything you've…
-
@_rick_v_" Be very careful about giving answers like this. Some Linux implementations of the *client* side of DHCP are vulnerable, because they use a strategy similar to that used to implement CGI scripts: When a DHCP response arrives, the informa…
-
It's remarkable how an ignorant article can spawn such a bunch of ignorant replies - when the article itself contains a pointer to the company's description of the technology. For the record: The comparison to inductive chargers for toothbrushes…