PART II Technical Overview: SystemForensics Tools, Techniques, and Methods CHAPTER 10 Macintosh Forensics

4/5/21, 5:17 PMSystem Forensics, Investigation, and Response

Page 1 of 2https://openpage-ebooks.jblearning.com/wr/printpage.html

System Forensics, Investigation, and Response
ISBN 9781284169942

PART II Technical Overview: SystemForensics Tools, Techniques, and Methods
CHAPTER 10 Macintosh Forensics

M
CHAPTER 10: Macintosh ForensicsMacintosh Forensics

ACINTOSH COMPUTERS MAY NOT BE AS UBIQUITOUS AS MICROSOFT-BASED PCS, but

they represent a significant portion of personal computers. For this reason, it is

important that you have at least a basic understanding of the Macintosh operating

system and how to conduct forensics on it. In this chapter, you will learn some history of the

Macintosh operating system as well as some operating system basics. You will also learn some

basic forensic techniques to use on a Macintosh.

Chapter 10 TopicsChapter 10 Topics

This chapter covers the following topics and concepts:

What the basic knowledge you need to know about Macintosh is

Where to find the logs in Macintosh

What forensically interesting directories are

What some forensic techniques for Macintosh are

How to undelete files in Macintosh

Chapter 10 GoalsChapter 10 Goals

When you complete this chapter, you will be able to:

225225

4/5/21, 5:17 PMSystem Forensics, Investigation, and Response

Page 2 of 2https://openpage-ebooks.jblearning.com/wr/printpage.html

Understand the basics of Macintosh and its history

Know where to find logs in a Macintosh system

Examine the virtual memory of a Macintosh

Undelete Macintosh files

4/5/21, 5:23 PMSystem Forensics, Investigation, and Response

Page 1 of 1https://openpage-ebooks.jblearning.com/wr/printpage.html

System Forensics, Investigation, and Response
ISBN 9781284169942

PART II Technical Overview: SystemForensics Tools, Techniques, and Methods
CHAPTER 10 Macintosh Forensics

Can You Undelete in Mac?Can You Undelete in Mac?

Recall that in Windows systems, deleting actually just removes a file from the master file table (MFT) or

file allocation table (FAT) and marks those clusters as available. The file’s data is still there and can be

recovered. What happens when a file is deleted on an HFS or HFS+ volume? Although the details are a

bit different, a similar thing occurs. The references to the file are gone and the clusters might be used

and overwritten. But, depending on how soon after the deletion you attempt to recover data, you may

be able to recover some or all of the data. Even if the data is overwritten, data may still exist in

unallocated space and in index nodes. When a file is deleted in Macintosh, it is moved to the trash

folder—much like the Recycle Bin in Windows. The trash is represented on the file system as a hidden

folder, .Trash, on the root directory of the file system. You can list the contents with a shell command, as

shown here:

$/.Trash ls -al

total 764

drwx—— 7 pc pc 306 Oct 30 15:05 .

drwxr-xr-x 30 pc pc 1054 Oct 30 12:44 ..

-rw——- 1 pc pc 6148 Oct 30 14:38 .DS_Store

-rw-r–r– 1 pc pc 187500 Oct 27 15:41 Resume.pdf

-rw-r–r– 1 pc pc 108382 Oct 27 15:43 VacationPIC.jpg

-rw-r–r– 1 pc pc 108382 Oct 27 15:43 Report.pdf

Now files in the trash directory can be recovered just by copying or moving them to any other location.

Note that the trash (.Trash folder) contains four files, each of which can be recovered by simply copying

or moving it to an alternate location. There are tools that will recover files, even after the trash bin has

been emptied. A few are given here:

Mac Undelete at http://www.macundelete.comhttp://www.macundelete.com
Free Undelete Mac at http://www.freeundeletemac.comhttp://www.freeundeletemac.com
MacKeeper at http://mackeeper.zeobit.comhttp://mackeeper.zeobit.com

Any of these tools can aid you in recovering deleted Macintosh files.

http://www.macundelete.com/

http://www.freeundeletemac.com/

http://mackeeper.zeobit.com/

4/5/21, 5:23 PMSystem Forensics, Investigation, and Response

Page 1 of 1https://openpage-ebooks.jblearning.com/wr/printpage.html

System Forensics, Investigation, and Response
ISBN 9781284169942

PART II Technical Overview: SystemForensics Tools, Techniques, and Methods
CHAPTER 10 Macintosh Forensics

How to Examine a MacHow to Examine a Mac

Many forensics tools do a wonderful job of extracting data from Windows machines, but are less

effective in Macintosh. OSForensics version 4.0 will include Mac OS X artifacts in its recent

history, but to examine the directories mentioned in this chapter, or to execute the Bash

commands, you may need more than tools can provide.

One technique is to create a copy of the forensic image and then mount it as a read-only virtual

machine (VM). It is critical that you mount it read only. You can find instructions on the Internet

for converting a forensic image to a virtual machine (such as a VMWare or Oracle VirtualBox).

However, the forensic tool Forensic Explorer (http://www.forensicexplorer.comhttp://www.forensicexplorer.com) will mount
forensic images as read-only virtual machines, using the VM of your choice. OSForensics version

4 (http://www.osforensics.comhttp://www.osforensics.com) will also allow you to create a virtual machine from a forensic
image.

235235

http://www.forensicexplorer.com/

http://www.osforensics.com/

4/5/21, 5:22 PMSystem Forensics, Investigation, and Response

Page 1 of 3https://openpage-ebooks.jblearning.com/wr/printpage.html

System Forensics, Investigation, and Response
ISBN 9781284169942

PART II Technical Overview: SystemForensics Tools, Techniques, and Methods
CHAPTER 10 Macintosh Forensics

Macintosh Forensic TechniquesMacintosh Forensic Techniques

This section covers some general forensic techniques to use on Macintosh systems. In the

preceding sections, you learned about the Macintosh operating system, and you learned where

to look for important logs, which is a valuable step in any forensic investigation. Now, you will

learn a variety of forensic techniques.

Target Disk ModeTarget Disk Mode

One of the most fundamental steps in forensics is to create a bit-level copy of the suspect drive.

If the suspect drive is a Macintosh, all the techniques you know from Linux or Windows can still

be used. You can utilize the dd command along with netcat to make a forensic copy. You can

also use the imaging tools within EnCase or Forensic Toolkit. However, Macintosh provides

another way to make a forensically sound copy of a drive. You begin by placing the suspect

computer into Target Disk Mode. When you put the computer in that mode, it cannot be written

to, so there is no chance of altering the source disk. Then simply connect to the suspect

computer with universal serial bus (USB) or FireWire and image the disk.

Also, Target Disk Mode allows you to preview the computer on-site. This allows investigators to

do a quick inspection before disconnecting and transporting the computer to a forensic lab. This

is important because, just like with Windows or Linux, you will want to check running systems’

processes before shutting the machine down. You simply have to reboot the machine in Target

Disk Mode, as shown in FIGURE 10-2FIGURE 10-2.

NOTE NOTE

Because Mac OS X is based on FreeBSD, Linux commands can be used here. So before

shutting the suspect Macintosh down, you will want to run netstat to see any

connections the system has. You may also want to run ps , pstree , and top to check

running processes.

https://openpage-ebooks.jblearning.com/op2_content/extracted_books/9781284169942-4.0.2/EPUB/xhtml/16_chapter10_04.xhtml%23fig10_2

4/5/21, 5:22 PMSystem Forensics, Investigation, and Response

Page 2 of 3https://openpage-ebooks.jblearning.com/wr/printpage.html

Searching Virtual MemorySearching Virtual Memory

Checking virtual memory is just as important with a Macintosh as it is with a Windows or Linux

computer. With Macintosh OS X, the swap file/virtual memory is located in the folder /var/vm/.

You can check it with simple Linux commands like ls (for listing files). A good option is ls —al ,

which gives you a listing of all the files in virtual memory, as well as of who launched the

program and when. The best news is that you can use the grep search tool to search in the

virtual memory folder.

Screenshot reprinted with permission from Apple Inc.

Shell CommandsShell Commands

Because Mac OS X is based on FreeBSD, you can use shell commands to extract information. A

number of commands can be quite useful in your forensic examination. Some additional

commands are available that are specific to Macintosh.

The The date Command Command

FIGURE 10-2 Target Disk Mode.

FIGURE 10-2 Target Disk Mode.

234234

4/5/21, 5:22 PMSystem Forensics, Investigation, and Response

Page 3 of 3https://openpage-ebooks.jblearning.com/wr/printpage.html

The date command returns the current date and time zone. It is good for documenting when

exactly you begin your forensic examination. If you need the date in Coordinated Universal Time

(UTC), then use the date −u version of the command.

The The ls /dev/disk? Command Command

This command lists the current device files that are in use. You should document this

information before shutting the system down for transport to the forensic lab.

The The /hdiutil partition /dev/disk0 Command Command

This command lists the partition table for the boot drive. Clearly, it is important to know the

partitions the machine recognizes upon boot-up.

The The system_profiler SPHardwareDataType Command Command

This command returns the hardware information for the host system. This provides information

useful for the basic documentation of the system prior to beginning your forensic examination.

There are related commands, such as system_profiler SPSerialATA-DataType . This command

gives information on all the attached Serial Advanced Technology Attachment (SATA) devices.

The The system_profiler SPSoftwareDataType Command Command

Related to system_profiler SPHardwareDataType , this command returns information about the

operating system. This is also important for documenting the system prior to starting the

forensic examination.

NOTE NOTE

There is an interesting trick you can do to circumvent passwords in Macintosh. If you

change the amount of physical memory, the firmware password is automatically reset.

So simply add or remove RAM, and then reboot.

4/5/21, 5:22 PMSystem Forensics, Investigation, and Response

Page 1 of 2https://openpage-ebooks.jblearning.com/wr/printpage.html

System Forensics, Investigation, and Response
ISBN 9781284169942

PART II Technical Overview: SystemForensics Tools, Techniques, and Methods
CHAPTER 10 Macintosh Forensics

DirectoriesDirectories

As with Windows and Linux, Macintosh has a number of directories. Some are more important

than others. You must know the ones in the following sections in order to do an effective

forensic examination of a Macintosh machine.

The /Volumes DirectoryThe /Volumes Directory

This directory contains information about mounted devices. You will find data here regarding

hard disks, external disks, CDs, DVDs, and even virtual machines. This is a very important

directory in your forensic examination.

The /Users DirectoryThe /Users Directory

This directory contains all the user accounts and associated files. This is clearly critical to your

investigation of a Macintosh machine.

The /Applications DirectoryThe /Applications Directory

This directory is where all applications are stored. Particularly in cases of malware, this is a

critical directory to check.

The /Network DirectoryThe /Network Directory

This directory contains information about servers, network libraries, and network properties.

The /etc DirectoryThe /etc Directory

Just as in Linux, this is where configuration files are located. Obviously, configuration files can be

quite interesting in a forensic investigation. It is often true that cybercriminals like to adjust the

system’s configuration. Sometimes this is done in order to facilitate the criminal’s return to the

system later.

233233

4/5/21, 5:22 PMSystem Forensics, Investigation, and Response

Page 2 of 2https://openpage-ebooks.jblearning.com/wr/printpage.html

TheThe

/Library/Preferences/SystemConfiguration/dom.apple.preferences.plist/Library/Preferences/SystemConfiguration/dom.apple.preferences.plist

FileFile

This file contains the network configuration data for each network card. This is important

information to document before beginning your search for evidence.

4/5/21, 5:21 PMSystem Forensics, Investigation, and Response

Page 1 of 2https://openpage-ebooks.jblearning.com/wr/printpage.html

System Forensics, Investigation, and Response
ISBN 9781284169942

PART II Technical Overview: SystemForensics Tools, Techniques, and Methods
CHAPTER 10 Macintosh Forensics

Macintosh LogsMacintosh Logs

One of the first steps in any forensic examination should be to check the logs. Remember that

logs are very important when examining a Windows or a Linux computer. They are just as

important when examining a Macintosh computer. This section examines the Macintosh logs

and what is contained in them.

The /var/log LogThe /var/log Log

The name of this log should suggest that it is a general repository for a lot of information. The

naming structure should also seem familiar. Remember that Mac OS X is based on FreeBSD, so

seeing file structures similar to Linux should be no surprise.

This directory has many logs in it. The /var/log/daily.out contains data on all mounted volumes,

including the dates they were mounted. This is very important in cases involving stolen data. You

can see what devices have been attached and get data from them.

This folder includes data on removable media, including serial numbers.

The /var/spool/cups FolderThe /var/spool/cups Folder

In this folder, you will find information about printed documents. If you need to know what

documents have been printed from this Macintosh, this folder can give you that information.

This includes the name of the document printed and the user who printed it.

The /Library/Receipts FolderThe /Library/Receipts Folder

This folder contains information about system and software updates. It is less useful for a

forensic investigation than some of the other folders; however, it can be useful to know if a given

patch was applied and when it was applied. This might be of some interest in investigating

malware crimes.

The /Users//.bash_history LogThe /Users//.bash_history Log

4/5/21, 5:21 PMSystem Forensics, Investigation, and Response

Page 2 of 2https://openpage-ebooks.jblearning.com/wr/printpage.html

As you know, Mac OS X is based on FreeBSD, a UNIX variant. When you launch the terminal

window, what you actually get is a Bash shell. So, this particular log can be very interesting. It will

show you a variety of commands. You might look for commands such as rm , which would be

removing or deleting something, or dd , indicating the user might have tried to make an image of

the drive.

The /var/vm FolderThe /var/vm Folder

In this folder, you will find a subfolder named app profile. This will contain lists of recently

opened applications, as well as temporary data used by applications. Both of these can be very

interesting in a forensic examination.

The /Users/ DirectoryThe /Users/ Directory

This is where various users’ files are stored. It is always a good idea to check in this directory to

find out if users have saved data here that could be used as evidence.

The /Users//Library/Preferences/ FolderThe /Users//Library/Preferences/ Folder

As you probably suspect, this folder contains user preferences. This might not seem that

interesting for a forensic investigation, except for one small issue: This folder even maintains the

preferences of programs that have been deleted. This could be a very valuable place to get clues

about programs that have been deleted from the system.

232232

4/5/21, 5:20 PMSystem Forensics, Investigation, and Response

Page 1 of 3https://openpage-ebooks.jblearning.com/wr/printpage.html

System Forensics, Investigation, and Response
ISBN 9781284169942

PART II Technical Overview: SystemForensics Tools, Techniques, and Methods
CHAPTER 10 Macintosh Forensics

HFS used concepts from the earlier SOS operating system that had been designed for the Apple

III. HFS was able to support file names as long as 255 characters, which was not available in FAT

(used by DOS).

Hierarchical File System PlusHierarchical File System Plus

This is an enhancement of the HFS file system, first used with Mac OS 8.1. Because HFS was the

standard for Macintosh, it became known as HFS Standard, while HFS+ became known as HFS
Extended. HFS+ is the preferred file system on Mac OS X. Most important, it supports journaling.
Journaling is basically the process whereby the file system keeps a record of what file

transactions take place so that in the event of a hard drive crash, the files can be recovered.

Journaling file systems are fault tolerant because the file system logs all changes to files,

directories, or file structures. The log in which changes are recorded is referred to as the file

system’s journal—thus, the term journaling file systems.

HFS+ also supports disk quotas. That allows the administrator to limit the amount of disk space

a given user can use, keeping that user from taking up all the space. HFS+ has two types of links.

The first type is the hard link, which is an inode that links directly to a specific file. A soft link, or

symbolic link, is essentially a shortcut.

HFS+ is architecturally similar to HFS, which is not surprising because it is an enhancement to

HFS; however, there are some key differences. One such difference is that HFS+ uses 32 bits for

allocation blocks, rather than 16 bits. HFS+ also supports long filenames, up to 255 characters.

Furthermore, HFS+ uses UnicodeUnicode, which is the international standard for information encoding

(for file naming), rather than ASCII (American Standard Code for InformationASCII (American Standard Code for Information

Interchange)Interchange), which is a set of codes defining all the various keystrokes you could make,

including letters, numbers, characters, and even the spacebar and Return keys.

For forensic examinations, one of the more important differences in HFS+ to keep in mind is

aliases. Aliases are like symbolic links; they allow you to have multiple references to a single file

or directory. HFS+ also has a very interesting optimization scheme. It essentially does

defragmentation on a per-file basis. The following conditions are checked, and if met, the file is

defragmented when it is opened:

229229

https://openpage-ebooks.jblearning.com/op2_content/extracted_books/9781284169942-4.0.2/EPUB/xhtml/24_glossary.xhtml%23gloss116

https://openpage-ebooks.jblearning.com/op2_content/extracted_books/9781284169942-4.0.2/EPUB/xhtml/24_glossary.xhtml%23gloss1

4/5/21, 5:20 PMSystem Forensics, Investigation, and Response

Page 2 of 3https://openpage-ebooks.jblearning.com/wr/printpage.html

The file is less than 20 megabytes in size.

The file is not already in use.

The file is not read-only.

The file is fragmented.

The system uptime is at least three minutes.

This means an HFS+ volume is routinely defragmenting itself. This is a significant advantage over

some other file systems, such as NTFS and FAT.

With an HFS+ volume, the first two sectors (sectors 0 and 1) are the boot blocks and are identical

to the boot blocks used in HFS. The third sector (Sector 2) has the volume header. It has a great

deal of pertinent forensic information, such as the size of allocation blocks and a timestamp that

describes when the volume was created.

The allocation file is important for forensics. It keeps track of which allocation blocks are free and

which are not. A 0 indicates the block is free, whereas a 1 indicates the block is in use. The

catalog file contains the records for all the files/directories on that volume. It uses a B-tree

structure to hold the data. Each record in the catalog file is 8 kilobytes in size.

Of particular interest is the command prompt. The command prompt in Macintosh OS X is a

Bash shell so you can execute Linux commands. This means you can use commands such as

lsof , pstree , and others.

Because HFS+ is the preferred file system for Mac OS X, it is one you will likely encounter when

doing forensic examinations of Apple computers.

ISO9660ISO9660

ISO9660ISO9660 is the file system used by compact discs (CDs). ISO9660 is not Macintosh specific, but

Apple does have its own set of ISO9660 extensions. Although a CD may be readable on either a

PC—Windows or Linux—or a Macintosh, the files on that CD may require a specific operating

system in order to be read.

Microsoft Disk Operating SystemMicrosoft Disk Operating System

Mac OS X includes support for Microsoft Disk Operating System (MS-DOS) file systems FAT12,

FAT16, and FAT32. This allows a Macintosh machine to read floppy disks (FAT12), as well as files

created with DOS/Windows 3.1.

New Technology File SystemNew Technology File System

230230

https://openpage-ebooks.jblearning.com/op2_content/extracted_books/9781284169942-4.0.2/EPUB/xhtml/24_glossary.xhtml%23gloss62

4/5/21, 5:20 PMSystem Forensics, Investigation, and Response

Page 3 of 3https://openpage-ebooks.jblearning.com/wr/printpage.html

Mac OS X includes read-only support for the New Technology File System (NTFS). This means if

you have a portable drive that is NTFS, Mac OS X can read that partition. But like ISO9660, the

files on that drive may be operating–system specific.

Universal Disk FormatUniversal Disk Format

Universal Disk Format (UDF)Universal Disk Format (UDF) is the file system used by DVD-ROM discs (both video and

audio). Like ISO9660, this only guarantees that Mac OS X can read the partition or drive; it does

not guarantee that Mac OS X can read the files.

UNIX File SystemUNIX File System

UNIX File System (UFS) is the file system used by FreeBSD and many other UNIX variants. Being

based on FreeBSD, Mac OS X can read UFS volumes.

Partition TypesPartition Types

Partition types are referred to in Apple documents as partition schemes. The partition type

determines how the partition is organized on the drive. Apple directly supports three different

partition schemes: the GUID Partition Table, the Apple Partition Map, and the master boot

record. All three partition types are described in this section.

GUID Partition TableGUID Partition Table

The GUID Partition Table (GUID stands for “globally unique identifier”) is used primarily with

computers that have an Intel-based processor. It requires OS X v10.4 or later. Intel-based

Macintosh machines can boot only from drives that use the GUID Partition Table.

https://openpage-ebooks.jblearning.com/op2_content/extracted_books/9781284169942-4.0.2/EPUB/xhtml/24_glossary.xhtml%23gloss117

4/5/21, 5:19 PMSystem Forensics, Investigation, and Response

Page 1 of 3https://openpage-ebooks.jblearning.com/wr/printpage.html

System Forensics, Investigation, and Response
ISBN 9781284169942

PART II Technical Overview: SystemForensics Tools, Techniques, and Methods
CHAPTER 10 Macintosh Forensics

Mac BasicsMac Basics

It is important that you have a working understanding of the Macintosh operating system before

attempting forensics. As with Linux, however, it is common for forensic examiners not to have a
good working knowledge of Macintosh systems. The reason for this is simple: Most people have

more exposure to Windows than to Macintosh. In fact, it is not uncommon to have a forensic

examiner who has never even used a Macintosh. So this section first shows you the history of

the Macintosh and then discusses the operating system fundamentals. This will establish a

baseline of knowledge to help you understand Apple systems.

Mac HistoryMac History

Apple began with Steve Wozniak and Steve Jobs collaborating while working from their homes. In

1975, they finished the prototype of the first Apple computer. Steve Wozniak worked for Hewlett-

Packard, and his employment contract required him to give his employer first right of refusal on

any new inventions he came up with. However, Hewlett-Packard was not interested and released

the technology to Steve Wozniak. This led to the formation of Apple Computer in April 1976. The

company’s three founders were Steve Jobs, Steve Wozniak, and Ronald Wayne. The first

computer was the Apple I, created by Wozniak.

That computer had an 8-bit microprocessor running at just below 1 MHz. The Apple I had a built-

in video terminal, sockets for 8 kilobytes of onboard random access memory (RAM), a keyboard,

and a cassette board meant to work with regular cassette recorders.

Apple IIApple II

It wasn’t long before the team came up with the Apple II. This computer was based on the same

microprocessor, but came in a plastic case with the keyboard built in. It was also the first

personal computer with color graphics. This was followed by a series of enhancements to the

Apple II: Apple II+, IIe, IIc, IIc+, IIe Enhanced, and IIe Platinum. In 1986, the Apple IIGS was

released; this computer was 16-bit rather than 8-bit.

There were multiple operating systems for the Apple II, including the following:

226226

4/5/21, 5:19 PMSystem Forensics, Investigation, and Response

Page 2 of 3https://openpage-ebooks.jblearning.com/wr/printpage.html

Apple DOS (Disk Operating System)Apple DOS (Disk Operating System)—The first edition was released as Apple DOS 3.1 in

1978. It had no relationship to Microsoft DOS.

Apple PascalApple Pascal—This was based on the p-system, an operating system developed at UC San

Diego. It was basically a virtual machine running p-code, and Pascal was the most popular

language for it. Apple Pascal was a similar design released in 1979.

Apple SOSApple SOS—This operating system was developed for the Apple III. The acronym stands for

Sophisticated Operating System. Every program that used SOS loaded the operating system into

memory as well. An SOS application disk consisted of a kernel (SOS.kernel); an interpreter

(SOS.Interp), which was often the application itself; and a set of drivers (SOS.Driver).

ProDOSProDOS—This was meant as a replacement for Apple DOS 3.3 and was based on SOS. It had

more support for programming, including assembly and BASIC. Eventually, this led to a 16-bit

version called ProDOS 16.

Lisa OSLisa OS—This operating system had a full graphical user interface with a file browser that was

navigated with mouse clicks. It also came with some basic office programs.

Beyond the Apple IIBeyond the Apple II

After the Apple II, the company changed the name to Macintosh and took a new direction with

its computers. The main points in that evolution are as follows:

The MacintoshThe Macintosh—Although today many people may think of Apple and Macintosh as

synonymous, the Macintosh was actually released by Apple in January 1984. It had an 8-MHz

Motorola processor, a black-and-white monitor, and a 3.5-inch floppy drive. The operating

system for Macintosh was System 1. This eventually led to the Macintosh II running System 7.

System 7System 7—This system allowed text dragging between applications, viewing and switching

applications from a menu, a control panel, and cooperative multitasking.

Mac OS for PowerPCMac OS for PowerPC—This Mac introduced the System 7.1.2 operating system.

AIX for PowerPCAIX for PowerPC—In 1996, Apple had a product called Apple Network Server that used a

variation of the IBM AIX system. It also used the Common Desktop Environment, a graphical user

interface that is popular in the UNIX world. This product did not do well in the market and was

discontinued in 1997.

Mac OS XMac OS X

The next major change was the introduction of Mac OS X, which is still used in Macintosh

computers today. The public beta version of the product was named Kodiak. The real change

with OS X was that the operating system was based on FreeBSD, a UNIX clone. When using Mac

OS X, you can navigate to a shell and run UNIX/Linux shell commands. The initial release of OS X

was followed by periodic improvements, each with an animal name:

Mac OS X v10.0, named Cheetah, was released in March 2001.

Mac OS X v10.1 was released the same year and was named Puma.

227227

4/5/21, 5:19 PMSystem Forensics, Investigation, and Response

Page 3 of 3https://openpage-ebooks.jblearning.com/wr/printpage.html

The next release was Mac OS X v10.2 in 2002, called Jaguar. This release included improved

graphics and iChat messaging.

In 2003, Apple released Mac OS X v10.3, named Panther.

Mac OS X v10.4, named Tiger, was released in 2005. This release had built-in support for

FireWire, and it had a new dashboard and updated mail program.

Mac OS X v10.5, called Leopard, was released in 2007. It had over 300 new features, support for

Intel x86 chips, and support for the new G3 processor.

In 2009, Apple released Mac OS X v10.6, Snow Leopard. Most of the changes in this release were

performance enhancements, rather than new features. For example, Snow Leopard had support

for multicore processors.

Mac OS X v10.7 was released in 2011 and code-named Lion. The major interface change with this

release was to make it more like the iOS interfaces used on the iPhone and iPad.

Mac OS X v10.8, named Mountain Lion, was released in 2012. This release had built-in support

for iCloud, to support cloud computing.

Mac OS X v10.10, code-named Yosemite, was …

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
Open chat
1
You can contact our live agent via WhatsApp! Via + 1 929 473-0077

Feel free to ask questions, clarifications, or discounts available when placing an order.

Order your essay today and save 20% with the discount code GURUH