Explore the world of Mac. Check out MacBook Pro, MacBook Air, iMac, Mac mini, and more. Visit the Apple site to learn, buy, and get support. Thankfully, there two precautions you can take to protect yourself and your Mac from intruders. One is a software-based encryption tool, and the other is a hardware-based encryption tool, both of. Included in the release notes for macOS Catalina 10.15.5 is the following: - Major new releases of macOS are no longer hidden when using the softwareupdate(8) command with the -ignore flag. Mac OS X has a built-in software update tool, called — you guess it — Software Update. You can access this by clicking on the Apple menu in the menu bar. When you launch this program, it will check Apple’s servers to see if any Apple software updates are available. Most methods of breaking into a Mac are variations on the same thing, so we're going to highlight the two easiest ways—one with a Mac OS X installer and one without—and show you how to avoid.
Sometimes, it can be useful to prevent a given volume from mounting at boot. You might want to hide an old OS version from Spotlight corruption. You just might not want to clutter your desktop.
Note: Encrypted disks are unlocked before the fstab file is read. In order for this procedure to work with an encrypted disk, you must first mount the disk, unlock it, and save the password in your keychain.
To do this, you will need basic understand of how to enter Terminal commands and use vi.
1) Make sure the disk you want to prevent mounting at boot is mounted.
2) Launch Terminal.
3) Run the following command to print out information about the disk:
diskutil info /Volumes/<volume that shouldn't be mounted>
4) Locate the line that starts with: Volume UUID:. Select the UUID (Universal Unique Identifier) that follows on the rest of the line. It will be something that looks like FF9DBDC4-F77F-3F72-A6C2-26676F39B7CE. Your value will be different
5) Copy the UUID to the clipboard.
6) Navigate to /etc by typing the following and pressing enter:
cd /etc
7) Edit (or create) an fstab file by typing the following and pressing enter:
sudo vifs
8) Enter the following line, substituting the UUID you copied in step 5). (Note: vifs uses the value of the EDITOR environment variable to pick the text editor to use. This article assumes you are using the default value of vim.) In vim, the editor starts in command mode. To add a new line, use the arrow keys to move to the end of the document and press the o key to append a new line and enter edit mode. Then type the following:
UUID=FF9DBDC4-F77F-3F72-A6C2-26676F39B7CE none hfs rw,noauto
and press the return key.
9) Type escape to return to command mode and then type ZZ (shift key down) to save and exit vifs (or some other method to save and exit if you are using something other than vim).
10) Type the following and press enter to reset the auto mounter:
sudo automount -vc
11) Quit Terminal
Now, the next time you restart, or unplug the drive in the case of an external drive, that volume will not be mounted. All you have to do is launch Disk Utility, select the grey, disabled volume, and click the Mount button.
You should be able to use a different text editor than vifs if you want. It needs to be able to edit and save files owned by root.
Note: If all of your disks are encrypted, there is an easier method. For any disk that you don't want to automatically mount, simply don't save the password to the keychain.