![]() |
|
Alles rund um Mac OSX & Linux: Google Chrome (auf Mac!) öffnet permanent automatisch WerbungWindows 7 Für alle Fragen rund um Mac OSX, Linux und andere Unix-Derivate. |
![]() | #1 |
| ![]() Google Chrome (auf Mac!) öffnet permanent automatisch Werbung Hi, ich grab den hier mal aus, weil ich genau das selbe Problem habe und der TE nicht mehr geantwortet hat. edit Bitte keine fremden Threads kapern. Es hat schon seinen Grund, dass hier jeder Hilfesuchende zu SEINEM PERSÖNLICHEN Problem, ein eigenes Thema aufmachen soll. Deine Beiträge wurden in ein neues Thema ausgelagert.... -- cosinus /edit Mein AdwareMedic Log: Code:
ATTFilter 2018-04-17 08:36:09: ----- Scan Started ----- 2018-04-17 08:36:09: Scanning with signatures version 51 2018-04-17 08:36:43: No adware found 2018-04-17 08:36:43: ----- Scan Ended ----- Code:
ATTFilter Start time: 08:45:13 04/17/18 Revision: 1174 Model Identifier: MacBookAir7,1 System Version: macOS 10.13.3 (17D47) Kernel Version: Darwin 17.4.0 System Integrity Protection: Enabled Time since boot: 24 minutes FileVault: On Log Apr 15 20:58:39 com.apple.xpc.launchd.domain.pid.SecurityAgent.312: Path not allowed in target domain: type = uid, path = /System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/HIServices.framework/Versions/A/XPCServices/com.apple.hiservices-xpcservice.xpc/Contents/MacOS/com.apple.hiservices-xpcservice error = 1: Operation not permitted, origin = /System/Library/Frameworks/Security.framework/Versions/A/MachServices/SecurityAgent.bundle Apr 15 20:58:39 com.apple.xpc.launchd.domain.pid.SecurityAgent.312: Path not allowed in target domain: type = uid, path = /System/Library/Frameworks/Security.framework/Versions/A/XPCServices/XPCKeychainSandboxCheck.xpc/Contents/MacOS/XPCKeychainSandboxCheck error = 1: Operation not permitted, origin = /System/Library/Frameworks/Security.framework/Versions/A/MachServices/SecurityAgent.bundle Apr 15 20:58:39 com.apple.xpc.launchd.domain.pid.SecurityAgent.312: Path not allowed in target domain: type = uid, path = /System/Library/Frameworks/IOKit.framework/Versions/A/XPCServices/IOServiceAuthorizeAgent.xpc/Contents/MacOS/IOServiceAuthorizeAgent error = 1: Operation not permitted, origin = /System/Library/Frameworks/Security.framework/Versions/A/MachServices/SecurityAgent.bundle Apr 15 20:58:39 com.apple.xpc.launchd.domain.pid.SecurityAgent.312: Path not allowed in target domain: type = uid, path = /System/Library/PrivateFrameworks/SpeechRecognitionCore.framework/Versions/A/XPCServices/com.apple.SpeechRecognitionCore.brokerd.xpc/Contents/MacOS/com.apple.SpeechRecognitionCore.brokerd error = 1: Operation not permitted, origin = /System/Library/Frameworks/Security.framework/Versions/A/MachServices/SecurityAgent.bundle Apr 15 20:58:39 com.apple.xpc.launchd.domain.pid.SecurityAgent.312: Failed to bootstrap path: path = /System/Library/Frameworks/Security.framework/Versions/A/XPCServices/XPCTimeStampingService.xpc, error = 1: Operation not permitted Apr 15 20:58:39 com.apple.xpc.launchd.domain.pid.SecurityAgent.312: Failed to bootstrap path: path = /System/Library/PrivateFrameworks/SpeechRecognitionCore.framework/Versions/A/XPCServices/com.apple.SpeechRecognitionCore.brokerd.xpc, error = 1: Operation not permitted Apr 15 20:58:39 com.apple.xpc.launchd.domain.pid.SecurityAgent.312: Failed to bootstrap path: path = /System/Library/Frameworks/ApplicationServices.framework/Versions/A/Frameworks/HIServices.framework/Versions/A/XPCServices/com.apple.hiservices-xpcservice.xpc, error = 1: Operation not permitted Apr 15 20:58:39 com.apple.xpc.launchd.domain.pid.SecurityAgent.312: Failed to bootstrap path: path = /System/Library/Frameworks/CoreServices.framework/Versions/A/Frameworks/DictionaryServices.framework/Versions/A/XPCServices/com.apple.DictionaryServiceHelper.xpc, error = 1: Operation not permitted Apr 15 20:58:39 com.apple.xpc.launchd.domain.pid.SecurityAgent.312: Failed to bootstrap path: path = /System/Library/Frameworks/IOKit.framework/Versions/A/XPCServices/IOServiceAuthorizeAgent.xpc, error = 1: Operation not permitted Apr 15 20:58:39 com.apple.xpc.launchd.domain.pid.SecurityAgent.312: Failed to bootstrap path: path = /System/Library/Frameworks/Security.framework/Versions/A/XPCServices/XPCKeychainSandboxCheck.xpc, error = 1: Operation not permitted Apr 15 20:58:48 com.avast.home.userinit: Service setup event to handle failure and will not launch until it fires. Apr 15 21:12:28 com.apple.iTunesHelper.5268: Service exited with abnormal code: 1 Apr 15 21:12:28 com.apple.Siri.agent: Service exited with abnormal code: 1 Apr 16 10:33:44 Failed to remove file or directory: name = com.apple.pkg.CoreFP.igFkBn, error = 1: Operation not permitted. Further logging suppressed. Apr 16 10:33:44 com.apple.xpc.launchd.domain.system: Could not import service from caller: path = /System/Library/LaunchDaemons/com.apple.platform.ptmd.plist, caller = launchd.1, error = 138: Service cannot be loaded on this hardware Apr 16 10:34:02 com.avast.home.userinit: Service setup event to handle failure and will not launch until it fires. Apr 16 10:34:09 com.google.keystone.user.agent: Service exited with abnormal code: 1 Apr 16 10:34:40 com.apple.xpc.launchd.domain.system: Could not read path: path = /Library/LaunchDaemons/com.microsoft.autoupdate.helpertool.plist, error = 2: No such file or directory Apr 16 11:25:41 com.apple.iTunesHelper.5268: Service exited with abnormal code: 1 Apr 16 11:25:41 com.apple.Siri.agent: Service exited with abnormal code: 1 Apr 17 08:21:47 Failed to remove file or directory: name = com.apple.pkg.CoreFP.igFkBn, error = 1: Operation not permitted. Further logging suppressed. Apr 17 08:21:47 com.apple.xpc.launchd.domain.system: Could not import service from caller: path = /System/Library/LaunchDaemons/com.apple.platform.ptmd.plist, caller = launchd.1, error = 138: Service cannot be loaded on this hardware Apr 17 08:22:02 com.avast.home.userinit: Service setup event to handle failure and will not launch until it fires. Apr 17 08:22:13 com.google.keystone.user.agent: Service exited with abnormal code: 1 Apr 17 08:40:04 com.apple.xpc.launchd.domain.pid.quicklookd.1620: Path not allowed in target domain: type = pid, path = /Library/Frameworks/iTunesLibrary.framework/Versions/A/XPCServices/com.apple.iTunesLibraryService.xpc error = 147: The specified service did not ship in the requestor's bundle, origin = /System/Library/Frameworks/QuickLook.framework/Versions/A/Resources/quicklookd.app Bad kernel extensions /System/Library/Extensions/AppleOSXUSBNCM.kext Loaded kernel extensions com.avast.FileShield (4.0.0) UUID com.avast.PacketForwarder (2.1) UUID Daemons com.avast.account com.avast.daemon com.avast.fileshield com.avast.init com.avast.osx.secureline.burger com.avast.osx.secureline.init com.avast.osx.secureline.racoonrun com.avast.osx.secureline.service com.avast.osx.secureline.uninstall com.avast.osx.secureline.update com.avast.proxy com.avast.service com.avast.uninstall com.avast.update com.avast.wifiguard com.microsoft.autoupdate.helper com.microsoft.office.licensingV2.helper org.postfix.master Agents 6H4HRTU5E3.com.avast.osx.secureline.avastsecurelinehelper com.apple.iBooksX.CacheDelete com.avast.helper com.avast.home.userinit - status: 78 com.avast.osx.secureline.home.userinit com.avast.osx.secureline.update-agent com.avast.osx.secureline.userinit com.avast.userinit com.dropbox.DropboxMacUpdate.agent com.google.keystone.user.agent - status: 1 com.microsoft.update.agent dylibs /Library/Application Support/Avast/components/proxy/certutil/libfreebl3.dylib /Library/Application Support/Avast/components/proxy/certutil/libnspr4.dylib /Library/Application Support/Avast/components/proxy/certutil/libnss3.dylib /Library/Application Support/Avast/components/proxy/certutil/libnssdbm3.dylib /Library/Application Support/Avast/components/proxy/certutil/libnssutil3.dylib /Library/Application Support/Avast/components/proxy/certutil/libplc4.dylib /Library/Application Support/Avast/components/proxy/certutil/libplds4.dylib /Library/Application Support/Avast/components/proxy/certutil/libsmime3.dylib /Library/Application Support/Avast/components/proxy/certutil/libsoftokn3.dylib /Library/Application Support/Avast/components/proxy/certutil/libssl3.dylib /Library/Application Support/Avast/lib/libcrypto.1.0.0.dylib /Library/Application Support/Avast/lib/libhns.dylib /Library/Application Support/Avast/lib/libjsoncpp.1.8.3.dylib /Library/Application Support/Avast/lib/libprotobuf-lite.8.dylib /Library/Application Support/Avast/lib/libssl.1.0.0.dylib /Users/USER/Library/Application Support/Firefox/Profiles/pp09kinh.default/gmp-gmpopenh264/1.5.3/libgmpopenh264.dylib /Users/USER/Library/Application Support/Firefox/Profiles/pp09kinh.default/gmp-widevinecdm/1.4.8.903/libwidevinecdm.dylib /Users/USER/Library/VirtualDJ/Plugins/libmp3lame.dylib App extensions com.getdropbox.dropbox.garcon com.microsoft.onenote.mac.shareextension Contents of /Library/Preferences/SystemConfiguration/com.apple.Boot.plist - mod date: Jul 15 22:38:22 2017 - checksum: 1199119104 <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "hxxp://www.apple.com/DTDs/PropertyList-1.0.dtd"> <plist version="1.0"> <dict> <key>Kernel Flags</key> <string></string> </dict> </plist> Contents of /Library/Preferences/com.apple.security.appsandbox.plist - mod date: Aug 4 11:26:31 2017 - checksum: 2599182411 <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "hxxp://www.apple.com/DTDs/PropertyList-1.0.dtd"> <plist version="1.0"> <dict> <key>UnrestrictSpotlightContainerScope</key> <true/> </dict> </plist> Contents of /etc/hosts - mod date: Feb 25 23:50:13 2016 - checksum: 3164423663 127.0.0.1 localhost 255.255.255.255 broadcasthost ::1 localhost Contents of /etc/pam.d/authorization - mod date: Oct 3 03:04:58 2017 - checksum: 1288902703 auth optional pam_krb5.so use_first_pass use_kcminit auth optional pam_ntlm.so use_first_pass auth required pam_opendirectory.so use_first_pass nullok account required pam_opendirectory.so Contents of /etc/pam.d/authorization_aks - mod date: Oct 3 02:59:34 2017 - checksum: 841932527 auth required pam_aks.so account required pam_opendirectory.so Contents of /etc/pam.d/authorization_ctk - mod date: Oct 3 03:00:59 2017 - checksum: 2418984201 auth required pam_smartcard.so use_first_pass pkinit account required pam_opendirectory.so Contents of /etc/pam.d/authorization_la - mod date: Oct 3 02:59:54 2017 - checksum: 2713564393 auth required pam_localauthentication.so auth required pam_aks.so account required pam_opendirectory.so Contents of /etc/pam.d/authorization_lacont - mod date: Oct 3 02:59:54 2017 - checksum: 3048101696 auth required pam_localauthentication.so continuityunlock auth required pam_aks.so account required pam_opendirectory.so Contents of /etc/pam.d/checkpw - mod date: Oct 3 02:40:14 2017 - checksum: 2672765862 auth required pam_opendirectory.so use_first_pass nullok account required pam_opendirectory.so no_check_home no_check_shell Contents of /etc/pam.d/chkpasswd - mod date: Sep 30 03:24:58 2017 - checksum: 335781771 auth required pam_opendirectory.so account required pam_opendirectory.so password required pam_permit.so session required pam_permit.so Contents of /etc/pam.d/cups - mod date: Oct 12 07:51:27 2017 - checksum: 2842188894 auth required pam_opendirectory.so account required pam_permit.so password required pam_deny.so session required pam_permit.so Contents of /etc/pam.d/login - mod date: Sep 30 03:24:31 2017 - checksum: 1242678644 auth optional pam_krb5.so use_kcminit auth optional pam_ntlm.so try_first_pass auth optional pam_mount.so try_first_pass auth required pam_opendirectory.so try_first_pass account required pam_nologin.so account required pam_opendirectory.so password required pam_opendirectory.so session required pam_launchd.so session required pam_uwtmp.so session optional pam_mount.so Contents of /etc/pam.d/login.term - mod date: Sep 30 03:24:31 2017 - checksum: 3930746290 account required pam_nologin.so account required pam_opendirectory.so session required pam_uwtmp.so Contents of /etc/pam.d/other - mod date: Jul 15 23:02:50 2017 - checksum: 2748091512 auth required pam_deny.so account required pam_deny.so password required pam_deny.so session required pam_deny.so Contents of /etc/pam.d/passwd - mod date: Sep 30 03:24:20 2017 - checksum: 1026516346 auth required pam_permit.so account required pam_opendirectory.so password required pam_opendirectory.so session required pam_permit.so Contents of /etc/pam.d/screensaver - mod date: Oct 3 03:12:26 2017 - checksum: 3141704602 auth optional pam_krb5.so use_first_pass use_kcminit auth required pam_opendirectory.so use_first_pass nullok account required pam_opendirectory.so account sufficient pam_self.so account required pam_group.so no_warn group=admin,wheel fail_safe account required pam_group.so no_warn deny group=admin,wheel ruser fail_safe Contents of /etc/pam.d/screensaver_aks - mod date: Oct 3 02:59:34 2017 - checksum: 3209544573 auth required pam_aks.so account required pam_opendirectory.so account sufficient pam_self.so account required pam_group.so no_warn group=admin,wheel fail_safe account required pam_group.so no_warn deny group=admin,wheel ruser fail_safe Contents of /etc/pam.d/screensaver_ctk - mod date: Oct 3 03:00:59 2017 - checksum: 367670211 auth required pam_smartcard.so use_first_pass account required pam_opendirectory.so account sufficient pam_self.so account required pam_group.so no_warn group=admin,wheel fail_safe account required pam_group.so no_warn deny group=admin,wheel ruser fail_safe Contents of /etc/pam.d/screensaver_la - mod date: Oct 3 02:59:54 2017 - checksum: 589164084 auth required pam_localauthentication.so auth required pam_aks.so account required pam_opendirectory.so account sufficient pam_self.so account required pam_group.so no_warn group=admin,wheel fail_safe account required pam_group.so no_warn deny group=admin,wheel ruser fail_safe Contents of /etc/pam.d/smbd - mod date: Jul 16 01:42:11 2017 - checksum: 2516643123 account required pam_sacl.so sacl_service=smb allow_trustacct session required pam_permit.so Contents of /etc/pam.d/sshd - mod date: Jul 16 00:02:08 2017 - checksum: 2989478361 auth optional pam_krb5.so use_kcminit auth optional pam_ntlm.so try_first_pass auth optional pam_mount.so try_first_pass auth required pam_opendirectory.so try_first_pass account required pam_nologin.so account required pam_sacl.so sacl_service=ssh account required pam_opendirectory.so password required pam_opendirectory.so session required pam_launchd.so session optional pam_mount.so Contents of /etc/pam.d/su - mod date: Jul 15 23:10:42 2017 - checksum: 2045483434 auth sufficient pam_rootok.so auth required pam_opendirectory.so account required pam_group.so no_warn group=admin,wheel ruser root_only fail_safe account required pam_opendirectory.so no_check_shell password required pam_opendirectory.so session required pam_launchd.so Contents of /etc/pam.d/sudo - mod date: Jul 15 23:04:32 2017 - checksum: 1168067210 auth sufficient pam_smartcard.so auth required pam_opendirectory.so account required pam_permit.so password required pam_deny.so session required pam_permit.so Contents of /etc/periodic/daily/110.clean-tmps - mod date: Jul 15 23:02:04 2017 - checksum: 4099837049 if [ -r /etc/defaults/periodic.conf ] then . /etc/defaults/periodic.conf source_periodic_confs fi case "$daily_clean_tmps_enable" in [Yy][Ee][Ss]) if [ -z "$daily_clean_tmps_days" ] then echo '$daily_clean_tmps_enable is set but' \ '$daily_clean_tmps_days is not' rc=2 else echo "" echo "Removing old temporary files:" set -f noglob args="-atime +$daily_clean_tmps_days -mtime +$daily_clean_tmps_days" args="${args} -ctime +$daily_clean_tmps_days" dargs="-empty -mtime +$daily_clean_tmps_days" dargs="${dargs} ! -name .vfs_rsrc_streams_*" [ -n "$daily_clean_tmps_ignore" ] && { args="$args "`echo " ${daily_clean_tmps_ignore% }" | sed 's/[ ][ ]*/ ! -name /g'` dargs="$dargs "`echo " ${daily_clean_tmps_ignore% }" | sed 's/[ ][ ]*/ ! -name /g'` ...and 21 more line(s) Contents of /etc/periodic/daily/130.clean-msgs - mod date: Jul 15 23:02:04 2017 - checksum: 4292599426 if [ -r /etc/defaults/periodic.conf ] then . /etc/defaults/periodic.conf source_periodic_confs fi case "$daily_clean_msgs_enable" in [Yy][Ee][Ss]) if [ ! -d /var/msgs ] then echo '$daily_clean_msgs_enable is set but /var/msgs' \ "doesn't exist" rc=2 else echo "" echo "Cleaning out old system announcements:" [ -n "$daily_clean_msgs_days" ] && arg=-${daily_clean_msgs_days#-} || arg= msgs -c $arg && rc=0 || rc=3 fi;; *) rc=0;; esac exit $rc Contents of /etc/periodic/daily/140.clean-rwho - mod date: Jul 15 23:02:04 2017 - checksum: 659374794 if [ -r /etc/defaults/periodic.conf ] then . /etc/defaults/periodic.conf source_periodic_confs fi case "$daily_clean_rwho_enable" in [Yy][Ee][Ss]) if [ -z "$daily_clean_rwho_days" ] then echo '$daily_clean_rwho_enable is enabled but' \ '$daily_clean_rwho_days is not set' rc=2 elif [ ! -d /var/rwho ] then echo '$daily_clean_rwho_enable is enabled but /var/rwho' \ "doesn't exist" rc=2 else echo "" echo "Removing stale files from /var/rwho:" case "$daily_clean_rwho_verbose" in [Yy][Ee][Ss]) print=-print;; *) print=;; ...and 14 more line(s) Contents of /etc/periodic/daily/199.clean-fax - mod date: Jul 15 23:02:04 2017 - checksum: 1104983357 if [ -r /etc/defaults/periodic.conf ] then . /etc/defaults/periodic.conf source_periodic_confs fi if [ -d /var/spool/fax ]; then echo "" echo "Removing scratch fax files" cd /var/spool/fax && \ find . -type f -name '[0-9]*.[0-9][0-9][0-9]' -mtime +7 -delete >/dev/null 2>&1; fi Contents of /etc/periodic/daily/310.accounting - mod date: Jul 15 23:02:04 2017 - checksum: 3208203734 if [ -r /etc/defaults/periodic.conf ] then . /etc/defaults/periodic.conf source_periodic_confs fi case "$daily_accounting_enable" in [Yy][Ee][Ss]) if [ ! -f /var/account/acct ] then echo '$daily_accounting_enable is set but /var/account/acct' \ "doesn't exist" rc=2 elif [ -z "$daily_accounting_save" ] then echo '$daily_accounting_enable is set but ' \ '$daily_accounting_save is not' rc=2 else echo "" echo "Rotating accounting logs and gathering statistics:" cd /var/account rc=0 n=$daily_accounting_save rm -f acct.$n.gz acct.$n || rc=3 m=$n ...and 18 more line(s) Contents of /etc/periodic/daily/400.status-disks - mod date: Jul 15 23:02:04 2017 - checksum: 1480768650 if [ -r /etc/defaults/periodic.conf ] then . /etc/defaults/periodic.conf source_periodic_confs fi case "$daily_status_disks_enable" in [Yy][Ee][Ss]) echo "" echo "Disk status:" df $daily_status_disks_df_flags && rc=1 || rc=3 ;; *) rc=0;; esac exit $rc Contents of /etc/periodic/daily/420.status-network - mod date: Jul 15 23:02:04 2017 - checksum: 2730873650 if [ -r /etc/defaults/periodic.conf ] then . /etc/defaults/periodic.conf source_periodic_confs fi case "$daily_status_network_enable" in [Yy][Ee][Ss]) echo "" echo "Network interface status:" case "$daily_status_network_usedns" in [Yy][Ee][Ss]) netstat -i && rc=0 || rc=3;; *) netstat -in && rc=0 || rc=3;; esac;; *) rc=0;; esac exit $rc Contents of /etc/periodic/daily/430.status-rwho - mod date: Jul 15 23:02:04 2017 - checksum: 3455351261 if [ -r /etc/defaults/periodic.conf ] then . /etc/defaults/periodic.conf source_periodic_confs fi case "$daily_status_rwho_enable" in [Yy][Ee][Ss]) rwho=$(echo /var/rwho/*) if [ -f "${rwho%% *}" ] then echo "" echo "Local network system status:" prog=ruptime else echo "" echo "Local system status:" prog=uptime fi rc=$($prog | tee /dev/stderr | wc -l) if [ $? -eq 0 ] then [ $rc -gt 1 ] && rc=1 else rc=3 fi;; ...and 3 more line(s) Contents of /etc/periodic/daily/999.local - mod date: Jul 15 23:02:04 2017 - checksum: 2319755381 if [ -r /etc/defaults/periodic.conf ] then . /etc/defaults/periodic.conf source_periodic_confs fi rc=0 for script in $daily_local do echo '' case "$script" in /*) if [ -f "$script" ] then echo "Running $script:" sh $script || rc=3 else echo "$script: No such file" [ $rc -lt 2 ] && rc=2 fi;; *) echo "$script: Not an absolute path" [ $rc -lt 2 ] && rc=2;; esac done exit $rc Contents of /etc/periodic/monthly/199.rotate-fax - mod date: Jul 15 23:02:04 2017 - checksum: 3437454680 if [ -r /etc/defaults/periodic.conf ] then . /etc/defaults/periodic.conf source_periodic_confs fi echo "" printf %s "Rotating fax log files:" cd /var/log/fax for i in *.log; do if [ -f "${i}" ]; then echo -n " $i" if [ -x /usr/bin/gzip ]; then gzext=".gz"; else gzext=""; fi if [ -f "${i}.3${gzext}" ]; then mv -f "${i}.3${gzext}" "${i}.4${gzext}"; fi if [ -f "${i}.2${gzext}" ]; then mv -f "${i}.2${gzext}" "${i}.3${gzext}"; fi if [ -f "${i}.1${gzext}" ]; then mv -f "${i}.1${gzext}" "${i}.2${gzext}"; fi if [ -f "${i}.0${gzext}" ]; then mv -f "${i}.0${gzext}" "${i}.1${gzext}"; fi if [ -f "${i}" ]; then mv -f "${i}" "${i}.0" && if [ -x /usr/bin/gzip ]; then gzip -9 "${i}.0"; fi; fi touch "${i}" && chmod 640 "${i}" && chown root:admin "${i}" fi done echo "" Contents of /etc/periodic/monthly/200.accounting - mod date: Jul 15 23:02:04 2017 - checksum: 3541581936 if [ -r /etc/defaults/periodic.conf ] then . /etc/defaults/periodic.conf source_periodic_confs fi oldmask=$(umask) umask 066 case "$monthly_accounting_enable" in [Yy][Ee][Ss]) W=/var/log/wtmp rc=0 remove=NO if [ $rc -eq 0 ] then echo "" echo "Doing login accounting:" rc=$(ac -p | sort -nr -k 2 | tee /dev/stderr | wc -l) [ $rc -gt 0 ] && rc=1 fi [ $remove = YES ] && rm -f $W.0;; *) rc=0;; esac umask $oldmask exit $rc Contents of /etc/periodic/monthly/999.local - mod date: Jul 15 23:02:04 2017 - checksum: 2355967272 if [ -r /etc/defaults/periodic.conf ] then . /etc/defaults/periodic.conf source_periodic_confs fi rc=0 for script in $monthly_local do echo '' case "$script" in /*) if [ -f "$script" ] then echo "Running $script:" sh $script || rc=3 else echo "$script: No such file" [ $rc -lt 2 ] && rc=2 fi;; *) echo "$script: Not an absolute path" [ $rc -lt 2 ] && rc=2;; esac done exit $rc Contents of /etc/periodic/weekly/320.whatis - mod date: Jul 15 23:02:04 2017 - checksum: 922328658 if [ -r /etc/defaults/periodic.conf ] then . /etc/defaults/periodic.conf source_periodic_confs fi case "$weekly_whatis_enable" in [Yy][Ee][Ss]) echo "" echo "Rebuilding whatis database:" MANPATH=`/usr/bin/manpath -q` if [ $? = 0 ] then if [ -z "${MANPATH}" ] then echo "manpath failed to find any manpage directories" rc=3 else rc=0 /usr/libexec/makewhatis.local "${MANPATH}" || rc=3 if [ X"${man_locales}" != X ] then for i in ${man_locales} do LC_ALL=$i /usr/libexec/makewhatis.local -a \ -L "${MANPATH}" || rc=3 ...and 9 more line(s) Contents of /etc/periodic/weekly/999.local - mod date: Jul 15 23:02:04 2017 - checksum: 3078968429 if [ -r /etc/defaults/periodic.conf ] then . /etc/defaults/periodic.conf source_periodic_confs fi rc=0 for script in $weekly_local do echo '' case "$script" in /*) if [ -f "$script" ] then echo "Running $script:" sh $script || rc=3 else echo "$script: No such file" [ $rc -lt 2 ] && rc=2 fi;; *) echo "$script: Not an absolute path" [ $rc -lt 2 ] && rc=2;; esac done exit $rc Contents of /etc/pf.conf - mod date: Jul 15 23:55:36 2017 - checksum: 2891177609 scrub-anchor "com.apple/*" nat-anchor "com.apple/*" rdr-anchor "com.apple/*" dummynet-anchor "com.apple/*" anchor "com.apple/*" load anchor "com.apple" from "/etc/pf.anchors/com.apple" Contents of /etc/syslog.conf - mod date: Jul 22 04:17:16 2017 - checksum: 2399118465 install.* @127.0.0.1:32376 Firewall: On DNS: 160.45.8.8 (static) User login items Unified Remote - /Applications/Unified Remote.app Dropbox - /Applications/Dropbox.app iTunesHelper - /Applications/iTunes.app/Contents/MacOS/iTunesHelper.app Restricted files: 2501 Lockfiles: 20 Elapsed time (sec): 342 Geändert von cosinus (18.04.2018 um 09:07 Uhr) |