|
|
don't root
There's no point in enabling the root user for hacks like this. You can just as well type this into the Terminal to get System Prefs to open with super user privs:
sudo open /Applications/System Preferences.app/
Give your own admin password when prompted to do so.
Enabling root can and should be considered harmful.
Errrrr... no
You can't do that!
Errrrr... no
Ok. So you want to take advantage of a feature that would lead to an even more massive security hole (ie. root)? Seeing as sudo is crippled, I suggest using TinkerTool like the other comments suggest.
Errrrr... no
Root is a security hole!? LOL. Some of the Mac OS 9 users on here are quite funny.
troll
Firstly, I have been running OS X prior to its public release, so this is no OS 9 user talk. Secondly, root is not a security hole per se, but when combined with a user who likens it to Mac OS 9's single user mode (ie. the ONLY usage mode), it could be (and would be) destructive. The user in combination with root is a security and file system integrity issue. That's exactly why root is disabled by default. Also, assuming that BSD's various known security issues haven't been brought over to Darwin is just plain naive.
troll
I agree with everything you've said there. In particular, the part of your post that said 'root is not a security hole'. Cheers.
tinker tool /// but there's more
tinker tool lets you specify which keyboard layout you'd like to use at login.
tinker tool /// but there's more
Thank you for that hint about getting rid of the us keyboard layout !!!!!
Fixing the layout changes at startup
You can also try JAW SetKbd (donationware), you can find it at: |
SearchFrom our Sponsor...Latest Mountain Lion HintsWhat's New:HintsNo new hintsComments last 2 daysNo new commentsLinks last 2 weeksNo recent new linksWhat's New in the Forums?
Hints by TopicNews from Macworld
From Our Sponsors |
|
Copyright © 2014 IDG Consumer & SMB (Privacy Policy) Contact Us All trademarks and copyrights on this page are owned by their respective owners. |
Visit other IDG sites: |
|
|
|
Created this page in 0.09 seconds |
|