Utilities: Your OS X Toolbox

The Utilities folder (inside your Applications folder) is home to another batch of freebies: a couple of dozen tools for monitoring, tuning, tweaking, and troubleshooting your Mac.

The truth is, you’re likely to use only about six of these utilities. The rest are very specialized gizmos primarily of interest to network administrators or Unix geeks who are obsessed with knowing what kind of computer-code gibberish is going on behind the scenes.

Tip

Even so, Apple obviously noticed that as the sophistication of OS X fans grows, more people open the Utilities folder more often. That’s why there’s a menu command and a keystroke that can take you there. In the Finder, choose Go→Utilities (Shift-⌘-U).

Activity Monitor is designed to let the technologically savvy Mac fan see how much of the Mac’s available power is being tapped at any given moment.

Even when you’re only running a program or two on your Mac, dozens of computational tasks (processes) are going on in the background. The top half of the dialog box, which looks like a table, shows you all the different processes—visible and invisible—that your Mac is handling at the moment.

Check out how many items appear in the Process list, even when you’re just staring at the desktop. It’s awesome to see just how busy your Mac is! Some are easily recognizable programs (such as Finder), while others are background system-level operations you don’t normally see. For each item, you can see the percentage of the CPU being used, who’s using it (either your account name, someone else’s, or root, meaning the Mac itself), whether or not it’s been written as a 64-bit app, and how much memory it’s using.

Or use the View menu above the list to see views like these:

At the top of Activity Monitor, you’re offered five tabs that reveal intimate details about your Mac and its behind-the-scenes efforts (Figure 11-34):

You use the AirPort Utility to set up and manage AirPort base stations (Apple’s wireless WiFi networking routers).

If you click Continue, it presents a series of screens, posing one question at a time: what you want to name the network, what password you want for it, and so on. Once you’ve followed the steps and answered the questions, your AirPort hardware will be properly configured and ready to use.

This program has a split personality; its name is a description of its two halves:

One of the luxuries of using a Mac that has Bluetooth is the ability to shoot files (to colleagues who own similarly clever gadgets) through the air, up to 30 feet away. Bluetooth File Exchange makes it possible, as described on Via Flash Drive.

This program helps you create (or destroy) a partition of your hard drive to hold a copy of Microsoft Windows. Details in Chapter 8.

If you use ColorSync, then you probably know already that this utility is for people in the high-end color printing business. Its tabs include these two:

The other tabs are described starting on ColorSync.

Console is a viewer for all of OS X’s logs—the behind-the-scenes, internal Unix record of your Mac’s activities.

Opening the Console log is a bit like stepping into an operating room during a complex surgery: You’re exposed to stuff the average person just isn’t supposed to see. (Typical Console entries: “kCGErrorCannotComplete” or “doGetDisplayTransferByTable.”) You can adjust the font and word wrapping using Console’s Font menu, but the truth is that the phrase “CGXGetWindowType: Invalid window -1” looks ugly in just about any font!

Console isn’t useless, however. These messages can be of significant value to programmers who are debugging software or troubleshooting a messy problem, or, occasionally, to someone you’ve called for tech support.

For example, your crash logs are detailed technical descriptions of what went wrong when various programs crashed, and what was stored in memory at the time.

Unfortunately, there’s not much plain English here to help you understand the crash, or how to avoid it in the future. Most of it runs along the lines of “Exception: EXC_BAD_ACCESS (0x0001); Codes: KERN_INVALID_ADDRESS (0x0001) at 0x2f6b657d.” In other words, it’s primarily for the benefit of programmers. Still, tech-support staff may occasionally ask to see the information in one of these logs.

DigitalColor Meter can grab the exact color value of any pixel on your screen, which can be helpful when matching colors in Web page construction or other design work. After launching the DigitalColor Meter, just point anywhere on your screen. A magnified view appears in the meter window, and the RGB (red-green-blue) color value of the pixels appears in the meter window.

Here are some tips for using the DigitalColor Meter to capture color information from your screen:

This important program serves two key functions:

The following discussion tackles the program’s two personalities one at a time.

Here are some of the tasks you can perform with this half of Disk Utility:

Chapter 13 has a much more detailed discussion of permissions.

If you turn on Erase Destination, then Disk Utility obliterates all the data on your target disk before copying the data. If you leave this checkbox off, however, Disk Utility simply copies everything onto your destination, preserving all your old data in the process (although it replaces files that have the same names and locations as the ones you’re copying).

Finally, click the Restore button. (You might need to type in an administrator password.) Restoring can take a long time for big disks, so go ahead and make yourself a cup of coffee while you’re waiting.

Disk images are very cool. Each one is a single icon that behaves precisely like an actual disk—a flash drive or hard drive, for example—but can be distributed electronically. For example, a lot of OS X apps arrive from your Web download in disk-image form, as shown below.

Disk images are popular for software distribution for a simple reason: Each image file precisely duplicates the original master disk, complete with all the necessary files in all the right places. When a software company sends you a disk image, it ensures that you’ll install the software from a disk that exactly matches the master disk.

As a handy bonus, you can password-protect a disk image, which is the closest OS X comes to offering the ability to password-protect an individual folder.

It’s important to understand the difference between a disk-image file and the mounted disk (the one that appears when you double-click the disk image). If you flip back to Disk images (.dmg files) and consult Figure 5-2, this distinction should be clear.

You can create disk images, too. Doing so can be very handy in situations like these:

Here’s how to make a disk image.

When you click Save (or press Return), if you opted to create an encrypted image, you’re asked to make up a password at this point.

Otherwise, Disk Utility now creates the image and then mounts it—that is, turns the image file into a simulated, yet fully functional, disk icon on your desktop.

When you’re finished working with the disk, eject it as you would any disk (right-click or two-finger click it and choose Eject, for example). Hang onto the .dmg disk image file itself, however. This is the file you’ll need to double-click if you ever want to recreate your “simulated disk.”

Grab takes pictures of your Mac’s screen, for use when you’re writing up instructions, illustrating a computer book, or collecting proof of some secret screen you found buried in a game. You can take pictures of the entire screen (press ⌘-Z, which for once in its life does not mean Undo) or capture only the contents of a rectangular selection (press Shift-⌘-A). When you’re finished, Grab displays your snapshot in a new window, which you can print, close without saving, or save as a TIFF file, ready for emailing or inserting into a manuscript.

Now, as experienced Mac enthusiasts already know, the Mac operating system has long had its own built-in shortcuts for capturing screenshots: Press Shift-⌘-3 to take a picture of the whole screen, and Shift-⌘-4 to capture a rectangular selection. (See Screen-Capture Keystrokes for all the details.)

So why use Grab instead? In many cases, you shouldn’t. The Shift-⌘-3 and Shift-⌘-4 shortcuts work like a dream. But there are some cases when it might make more sense to opt for Grab. Here are two:

This little unsung app is an amazing piece of work. It lets you create 2-D or 3-D graphs of staggering beauty and complexity.

When you first open Grapher, you’re asked to choose what kind of virtual “graph paper” you want: two-dimensional (standard, polar, logarithmic) or three-dimensional (cubic, spherical, cylindrical). Click a name to see a preview; when you’re happy with the selection, click Open.

Now the main Grapher window appears (Figure 11-38). Do yourself a favor. Spend a few wow-inducing minutes choosing canned equations from the Examples menu, and watching how Grapher whips up gorgeous, colorful, sometimes animated graphs on the fly.

When you’re ready to plug in an equation of your own, type it into the text box at the top of the window. If you’re not such a math hotshot, or you’re not sure of the equation format, work from the canned equations and mathematical building blocks that appear when you choose Equation→New Equation from Template or Window→Show Equation Palette (a floating window containing a huge selection of math symbols and constants).

Once the graph is up on the screen, you can tailor it like this:

When it’s all over, you can preserve your masterpiece using any of these techniques:

Finally, click Create Animation. After a moment, the finished movie appears. If you like it, choose File→Save As to preserve it on your hard drive for future generations.

Keychain Access memorizes and stores all your secret information—passwords for network access, file servers, FTP sites, Web pages, and other secure items. For instructions on using Keychain Access, see Chapter 13.

This little cutie automates the transfer of all your stuff from another Mac or even a Windows PC, to your current Mac: your Home folder, network settings, programs, and more. This comes in extremely handy when you buy a newer, better Mac—or when you need Time Machine to recover an entire dead Mac’s worth of data. (It can also copy everything over from a secondary hard drive or partition.) The instructions on the screen guide you through the process (see Appendix A).

Network Utility isn’t actually in Yosemite’s Utilities folder. It now lives in a deeply nested folder where you’d never think to look (System→Library→CoreServices→Applications). But you can quickly find and open it with a Spotlight search, or from within System Information, described below (choose Window→Network Utility).

In any case, it gathers information about Web sites and network citizens. It offers a suite of standard Internet tools like netstat, ping, traceroute, DNS lookup, and whois—advanced tools, to be sure, but ones that even Mac novices may be asked to fire up when calling a technician for Internet help.

Otherwise, you probably won’t need to use Network Utility to get your work done. However, Network Utility can be useful when you’re doing Internet detective work.

This little program, formerly called AppleScript Editor, is where you can type up your own AppleScripts. You can read about these programmery software robots in the free online appendix to this chapter, “Automator & AppleScript.pdf.” It’s available on this book’s “Missing CD” page at www.missingmanuals.com.

System Information (formerly called System Profiler) is a great tool for learning exactly what’s installed on your Mac and what’s not—in terms of both hardware and software. The people who answer the phones on Apple’s tech-support line are particularly fond of System Profiler, since the detailed information it reports can be very useful for troubleshooting nasty problems.

There are actually two versions of System Information: a quick, easy snapshot and a ridiculously detailed version:

When System Information opens, it reports information about your Mac in a list down the left side (Figure 11-41). The details fall into these categories:

Underneath its shiny skin, OS X is actually Unix, one of the oldest and most respected operating systems in use today. But you’d never know it by looking; Unix is a world without icons, menus, or dialog boxes. You operate it by typing out memorized commands at a special prompt, called the command line. The mouse is almost useless here.

Wait a minute—Apple’s ultramodern operating system, with a command line?! What’s going on? Actually, the command line never went away. At universities and corporations worldwide, professional computer nerds still value the efficiency of pounding away at the little C: or $ prompts.

You never have to use OS X’s command line. In fact, Apple has swept it pretty far under the rug. There are, however, some tasks you can perform only at the command line.

Terminal is your keyhole into OS X’s Unix innards. There’s a whole chapter on it waiting for you on this book’s “Missing CD” page at www.missingmanuals.com.

For details on this screen-reader software, see VoiceOver.