Crosh Commands Hack On Mac

Apr 05, 2018  Commands on CROSH ( ctrl + alt + T = Crosh ) - Duration: 10:00. HacksXXX 280 views. 4 Computer Spy Hacks YOU CAN DO RIGHT NOW (Simple and Clever) - Duration: 15:08. Ctrl+B Buy Bitcoin Earn $10 Free: Ctrl+L Buy AltCoins: Ctrl+P DoorDash Credit: Ctrl+E Visual eBay Visual eBay.

  • Dec 09, 2017 Once you enter this command, your Mac's digital eyes will be pried open and prevented from going to sleep until you end it by pressing Control-C. If you don't want to rely on being the one to end your poor Mac's suffering, you can also create a set a number of seconds before your Mac sleeps: caffeinate -u -t 5400.
  • The network interface commands are also exceptionally useful for troubleshooting connectivity problems. Also, note that with few exceptions, the following commands are mostly universal. That is, they can be utilized on almost all varieties of Linux, and some of them can even be used in an OSX environment since Mac OSX is a descendant of BSD.

Just about every geek and nerd that wants to be a hacker always wants to skip straight to the good stuff, and it’s no wonder why. There’s a certain amount of mystery, intrigue, and awe in being able to used advanced tools (such as those found on Kali Linux like Metasploit) to hack into another computing system. Hackers have been around for decades now, and are frequently present in action and thriller films, such as The Matrix. And to be fair, we’ve gone through some detailed guides that show how to use these tools.

For instance, we’ve already covered NMAP, Metasploit, and other similar tools. But there’s one big problem. These tools work almost exclusively at the command line, or in Linux, the BASH shell. And even the highest quality guides are flawed – especially in the hands of a newb. You see, a single article can’t hope to cover every eventuality, caveat, an ‘gotchas.’

Computers are composed of individual parts made all around the world, and assimilated as a hodgepodge of different manufacturers’ parts. The amount and type of memory, wireless card, processor architecture, HDD or SDD, peripheral devices, and more vary greatly from system to system, and Kali (or for that matter, Linux) can’t hope to to run exactly the same on every different piece of hardware.

Even if you’re hacking guide is highly detailed, chances are that you’ll run into a surprising error that doesn’t fit in nicely with your guide’s 12 easy steps. And most guides can’t hope to account for every single error. Doing so would lie far outside the scope of the guide.

As such, it’s imperative that hackers and penetration testers who want to learn how to hack have a solid foundational knowledge of common BASH shell concepts. Look folks, though they may not be the most ‘sexy’ commands, there are some simple commands that you need to know like the back of your hand.

If you get caught on the job not knowing how to run these simple commands, you’re likely going to get laughed out of the office – and perhaps even be handed a pink slip. So, today we’re going to be talking about general purpose BASH commands that you really need to know before moving on to advanced hacking topics. Basically, you need to be comfortable in a command line environment, so let’s start with one of my favorites: network interface configuration commands.

The network interface commands are also exceptionally useful for troubleshooting connectivity problems. Also, note that with few exceptions, the following commands are mostly universal. That is, they can be utilized on almost all varieties of Linux, and some of them can even be used in an OSX environment since Mac OSX is a descendant of BSD.

For reference, we are going to be taking a closer look at how to make shell configurations regarding the following topics:

  • Network interfaces

  • Canceling commands

  • Default gateways and routes

  • Piping commands

  • Viewing and killing processes

  • File system navigation

Many of these topics will be useful to those wishing to test for Linux certifications such as the Comptia Linux+ or LPI certs. To put it bluntly, you should really know these basics before trying to run advanced packet capture and Metasploit demos. So, without further adieu, let’s start with the network interface commands.

Network Interfaces

Whether using an internal wireless card in your laptop, Ethernet, or an external USB wireless interface, you had better darn well know how to configure them. Just about all of the wireless hacking demos we’ve run involve configuring a wireless interface in some way, and you need to know how read their current configuration. So, let’s start with the basics. The following command pulls up current interface configuration data:

  • ifconfig

Those of you who have worked in the Windows command prompt can easily remember this command, because it only has a single character that varies from the Window’s ipconfig command. Go ahead and run it, and notice that all of the data is separated by interface.

This command is incredibly useful because it will quickly display encapsulation type, MAC address, IP address, broadcast address, subnet mask, transmit and receive packet-count, total information sent over the interface, and other useful information. But it doesn’t show all the available data for that interface. For a more detailed report of interface data, simply run the following command:

  • ifconfig -a

In the command listed above, the -a parameter indicates ‘all.’ It will show incredibly detailed information that is useful to network engineers, and can help troubleshoot network interface problems. If your terminal window is getting too messy, you can simply enter the clear command to clear things up a bit. Also, you can run ifconfig followed by an interface’s name to only display parameters for that individual interface.

Furthermore, you’re going to need to know how to bring an interface online and offline (or up and down). Often times, after making a configuration change to an individual interface, it’s necessary to ‘bounce’ the interface by bringing it down, and then bringing it up again. You do need to have administrative privilges to run these commands. Also, note that if you’re running a live version of Linux – such as one installed on a bootable USB flash drive like Ubuntu Live – you’ll likely need to precede the commands with the sudo command.

  • ifconfig [interface_name] down

  • ifconfig [interface_name] up

So, for instance, if I wanted to reset my Ethernet interface, I would run the ifconfig eth0 down command. After waiting for a decent amount of time (30 seconds at least to be safe), I’d then run the ifconfig eth0 up. Note that the interface’s name includes a zero rather than the letter of the alphabet sandwiched between ‘N’ and ‘P.’ Your interface names may differ, too, so just run the ifconfig command to display the interfaces’ names.

And arguably, one of the largest reasons that Linux is so powerful is due to it’s command line. You can make configurations within seconds without having to go through long and contrived GUI windows to find the correct setting. It would be a good idea to know how to change IP address information on a per-interface basis as follows:

  • ifconfig eth0 10.1.1.2

  • ifconfig eth0 netmask 255.255.255.0

  • ifconfig eth0 broadcast 10.1.1.255

In order, these commands will set the IP address, subnet mask, and broadcast address of the specified interface – which is eth0 in this example. Next up, you’ll also want to know how to set an interface in promiscuous mode. This is an undoubtedly crucial tool for most kinds of wireless hacking, so let’s first define what this mode does.

Through various network mediums and address types (such as broadcast frames on wireless interfaces or broadcast data like ARP protocol data), an interface can be presented with frames that weren’t addressed to the receiving interface. The default action of the interface is to drop these packets, since it’s not the intended destination. However, many attacks leverage the information contained within the frames and packets.

By setting the interface in promiscuous mode, the interface will receive and process the frames that weren’t intended for it, and instead send them to the CPU for processing. Use the following command:

  • ifconfig eth0 promisc

This mode of operation is frequently used in a lot of different network tools, such as protocol analyzers and packet captures. If you want to shut off promiscuous mode on an interface, simply run the following command:

Hack
  • ifconfig eth0 -promisc

Canceling a Command

Sometimes, for whatever reason, you may find that a command has frozen, locked up, or is simply taking too long to complete. Linux novices typically find this incredibly frustrating, and don’t know how to cancel the command. Instead, they simply close out the terminal window and open a new one – but there’s a much simpler way. Simply issue the following command hotkey to cancel currently running command or one that is hanging:

  • ctrl + c

To test it out, run something like a ping command. For instance, ping Google’s DNS servers with the ping 8.8.8.8 command. You’ll notice that the shell will continue pinging the server on an endless loop. To stop the ping operation, just run the ctrl + c command and it should terminate.

Default Gateway and Routes

Every competent network engineer and penetration tester should have a firm grasp on routing technologies. It’s fairly atypical to setup custom routes for an individual computer, because that function is typically controlled by routers. Nevertheless, you should know how to view your Linux system’s routing table. And the command couldn’t be simpler, as follows:

  • route

The most practical purpose for this command is to check and verify your default route. In a home setting, the default route is going to almost always be your wireless router. But in corporate and professional network environments, there may be more complex configurations.

Piping Commands

One of the wonderful and powerful qualities of the BASH shell is that one command’s output can be used as input for another command. These features are unbelievably flexible, and allow for command formatting and complex configurations. However, we’re only going to be discussing the most rudimentary of piping techniques today.

You may have noticed that sometimes when entering a command, the entire shell window fills up with loads of text that all flit by in fractions of a second. If you want to read the output page by page, you can simply pipe it to the less command. The pipe symbol is located directly above the enter key on most keyboards, and looks like a solid vertical line. The syntax to pipe command output to less follows:

  • [command] | less

We’re going to be using this in the services and daemons section, but for now test it out on a simple command. For instance, issue the following command:

  • ifconfig -a | less

Doing so will display your network interface information one page at a time. Now you can use the arrow keys to move up and down the output, or hit the spacebar to move down an entire page. If you want to exit the output display, simply type the ‘q’ key to quit and be returned to the command prompt.

Viewing and Killing Currently Running Processes

There are a seemingly endless number of process running diligently in the background of your Linux system. It would be of great benefit to know how to view them and potentially kill them. Sometimes a process might malfunction, and even cause a memory leak. There are so many processes that, for the sake of this demonstration, we’re going to be piping the command output to less. Run the following command:

  • ps aux | less

Note that there are actually several ways to view currently running processes, too. Alternatively, you can use the jobs or top commands. They will show you related information, such as the owner, process ID, and other vital information about background processes.

However, once in a while, you may need to shut one of these processes down. It’s rare for a process to render a Linux system completely unusable. Nevertheless, runaway and zombie background processes aren’t uncommon in a Window’s environment. And you should also consider that Linux is susceptible to viruses more than ever before. So, being able to kill a process is crucial. Simply use the following command:

  • kill[process_id]

For example, if I wanted to kill my Firefox process because it crashed and wasn’t behaving properly, I would issue the command as follows:

  • kill 17648

It’s just a matter of looking up the process ID before running the kill command.

File System Navigation

Though understanding the entirety of the Linux file system lies far outside the scope of this guide, knowing how to navigate the file system from the command line is one of the most basic and fundamental skills. The first command you need to know relates to knowing which directory you reside in.

In Linux, this is known as your current working directory. And the command to display that information is known as the print working directory command, as follows:

  • pwd

By default, you’re likely in the home directory. To change directories, simply use the following command:

  • cd [directory]

For instance, if I wanted to change to the root directory (assuming I had root privileges), I would type ‘cd /’. Also, if you simply wanted to move up one level to the next highest directory, you can issue the ‘cd ../’ command. But knowing what files and folders are available for navigation requires you to run the list command. Doing so will show you all files and folders within your current working directory. The basic command is as follows:

  • ls

This command will simply display common files and folders, but it has several useful parameters to display more information. If you wished to view the read, write, and edit permissions for the current user or group, simply issue a long-listing command as follows:

  • ls -l

This command will also display when a file was created or last edited, though it won’t display hidden files. If you’re trying to make a configuration change to an application file, it will likely be hidden, so simply run the following command:

  • ls -a

Note that all of the hidden files and folders will be preceded with the ‘.’ character. There are actually a lot of different flags that can be used with the ls command, but this should suffice for basic file system navigation. Between the ls, cd, and pwd commands, you should be able to navigate throughout your HDD/SDD’s Linux file system by only using the terminal.

Final Thoughts

These don’t make up every foundational command that you should learn in order to be competent using the BASH shell. However, these are certainly some of the most important from a perspective of penetration testing and hacking. In particular, you should learn the ifconfig and route commands, and know them like the back of your hand.

If you’re new to the BASH shell, I’d learn these commands – and learn them well – before pursuing harder tutorials. But after using the shell for a while, perhaps as little as a week or two, they should become second nature to you. And having the ability to pull up all of this information on the fly is what makes Linux so powerful.

You won’t have to navigate through a tedious organization of text fields and GUI windows. Though Windows does have the CMD prompt, it isn’t anywhere near as powerful as the BASH shell. Once you factor in the ability to write and run scripts and use advanced tools like Metasploit, you’ll begin to understand what makes Kali Linux so formidable. Stay tuned for more tutorials as well, because we’ll run through tutorials to help demystify the most popular Kali command line tools that hackers and penetration testers use to break other computing systems.

Terminal

Hey

Terminal is Mac OS X way into the command line world. It is designed for you to typing in specific commands that you would not be able to do otherwise. This is great for customizing your Mac and unveiling hidden features. It is also a good way to destroy you system because you screwed something up.

What I have done is crawl the web look of the Top 50 Terminal commands. These commands are designed to make you make look cooler, act quicker or be generally useful. I have tried to keep commands down to one line, so they are simple and effective to use. Each item will include a description of what it does as well as an appropriate picture is necessary. Many of these commands appear as seperate posts all over the web, but never in one big list. I have tried to keep the amount of sudo commands down to a minimum as this can easily destroy your system. Especially if you go sudoing every thing. I have tried to give the best description I can, if you have a problem leave a comment and I will see if I can solve it. The list is in no particular order. Most of the commands can be reverted by replacing YES with NO and 1 with 0, the opposite. Most of these commands are Leopard compatible and many may not work on Tiger. Try them and see what happens.

1) 2D Dock


This quite a popular hack for the people running Leopard and don’t like the 3D feel. It changes the 3D dock to a flat 2D version. To enter copy and past the following code.

defaults write com.apple.dock no-glass -boolean YES
killall Dock

2) Gradient Behind A Stack Item


One of my favourite hacks that enables you to put a small gradient behind an icon. I think this should be enabled by default.

defaults write com.apple.dock mouse-over-hilte-stack -boolean YES
killall Dock

3) Add A Message To The Login Window

Crosh commands hack on mac pc

This little Terminal command enables you to add a message of your choice to the Login window. Pretty cool and deserved a screenshot if I new how to take on while not logged in. Warning it’s a sudo command which can be dangerous.

sudo defaults write /Library/Preferences/com.apple.loginwindow LoginwindowText 'Your Message'

Replace “Your Message” with the message of your choice, don’t make it to long. If you want to revert it do the following.

sudo defaults write /Library/Preferences/com.apple.loginwindow LoginwindowText '

4) Add An Exposè Button To The Desktop

If you have reconfigured the F9 and F10 keys to something different you may want to use exposè. This hack adds a bigish blue button onto the desktop to enable you to use exposè. Clicking on it shows all the windows from one application (F10 default), option clicking it shows all windows (F9 default).


defaults write com.apple.dock wvous-floater -bool YES
killall Dock

5) Address Book Debug Menu

If you have some trouble with Address Book it may be useful to open up the debug menu as well as this use some of the hidden features. Make sure address book is closed first before applying the code. If you want to revert it remove YES in the string.


defaults write com.apple.addressbook ABShowDebugMenu -bool YES

6) Increase Dock Magnification Size

This little hack lets you increase the size of the magnification of the dock icons. Don’t go past 512.

defaults write com.apple.dock largesize -int 512

7) Increase Desktop Icon Size

If you want massive icons on you desktop this little hack lets you increase the icons to 512 pixels x 512 pixels. This is massive, may slow down on older machines. I don’t think it goes larger than 512.

defaults write com.apple.finder DesktopViewOptions -dict IconSize -integer 512
killall Finder

8) Changing the Format Of Screen Shots

If you use the screen shot function, you may want to change the format of the images, this is not easily done normally. Where jpg is in the code you can change this to the format your want, png bmp gif etc. You need to log out and back in again, or restart for the changes to take effect.

defaults write com.apple.screencapture type jpg

9) Change The Login Picture

If you get a bored of the space picture used on the login screen, you can change it with this little bit of code. Change the file location in the second half of the string to the exact file location of your chosen picture.

defaults write /Library/Preferences/com.apple.loginwindow DesktopPicture '/System/Library/CoreServices/Finder.app/Contents/Resources/vortex.png'

10) Change The Loading Bar In Safari To A Pie Chart


This is a Safari 3 hack, so it might not work. This changes the blue bar that goes across the address bar into a small blue pie chart. Insert false instead of true to reverse.

defaults write com.apple.Safari DebugUsePieProgressIndicator -bool true

11) Clear The Open With Menu

If you right click on a file you can open it with many applications. Sometimes your OS can get a little confused and list many applications. This is to clear this list and start again. The code below is all on one line.

/System/Library/Frameworks/CoreServices.framework/Versions/A/Frameworks/
LaunchServices.framework/Versions/A/Support/lsregister
-kill -r -domain local -domain system -domain user

12) Change The Delay When Dragging Windows In Spaces

This simple hack changes the delay time it takes to drag windows around in spaces, its currently set to 0.75

defaults write com.apple.dock workspaces-edge-delay -float 0.5

13) Disable Dashboard

Crosh commands hack on mac download

If you don’t want or like the dashboard running you can disable it. Change YES to NO to enable it again.

defaults write com.apple.dashboard mcx-disabled -boolean YES
killall Dock

14) Enable Double Scroll Arrows


This little hack enables the double arrow set for up and down, left or right, to be at both ends of the scroll bar. Handy if you like the double arrows. Use System Preferences to reset.

defaults write “Apple Global Domain” AppleScrollBarVariant DoubleBoth

15) Disable Tooltips In Safari

This quick little hack for Safari that removes the tooltips you get when you hover over certain elements.

defaults write com.apple.Safari WebKitShowsURLsInToolTips 0

16) Increase The Dock Size

Command #6 enables you to change the magnification. This command enables you to change the size of the dock. Use the sliders in System Preferences to reduce this size. Don’t go larger 256.

defaults write com.apple.dock tilesize -int 256

17) Disable the Crash Dialog Box

This disables the quit dialog box when an application crashes. Type prompt to enable again.

defaults write com.apple.CrashReporter DialogType none

18) Drag A Widget Onto The Desktop


Probably one of the coolest hacks. This command enables widgets to be placed onto the desktop. Drag a widget around and press F12 to drag it onto the desktop. Repeat the process again to drag a widget back onto the dashboard. This may need you to log off or restart for it to take effect.

defaults write com.apple.dashboard devmode YES

19) Enable Debug Menu In Safari


Adding debug menus to programs is great as you can access a whole range of features. This one is for Safari.

defaults write com.apple.Safari IncludeDebugMenu 1

20) Enable The Path View In Finder


One of may favourite hacks as it lets you see the current path of the Finder window you are in. Its great if you work with a lot of windows.

defaults write com.apple.finder _FXShowPosixPathInTitle -bool YES

21) Enable Time Machine On Unsupported Drives


Another favourite hack of mine, simply because it enable Time Machine to work on unsupported drives such as a NAS. Use with caution as it is unsupported.

defaults write com.apple.systempreferences TMShowUnsupportedNetworkVolumes 1

22) Enable Web Inspector


This is a very detailed web inspector that enables you to find out specific information about a page. It is accessible through the debug menu but this enables you to use it without. You can quickly access it through right-click.

defaults write com.apple.Safari WebKitDeveloperExtras -bool true

23) Enable Debug in iCal

Another debug menu (I like debug menus) this time its for iCal. You need to restart iCal for the changes to take effect.

defaults write com.apple.iCal IncludeDebugMenu YES

24) Enable Quit In Finder


This is a very useful command for anyone who does a lot of fiddling and needs to quit Finder.

defaults write com.apple.finder QuitMenuItem -bool YES
killall Finder

25) Force Mail To Display In Plain Text

If you have problems with HTML emails or you just want emails to be displayed in plain text use the following command. You need to restart Mail for the changes to take effect. Replace with false to revert.

defaults write com.apple.mail PreferPlainText -bool TRUE

26) Increase Time Machine Backups

Crosh Hacking Commands

If you do a lot of work on you Mac, and you want time machine to back up more frequently you need to change the value. It is in seconds. The default is set to an hour which is 3600. Change this value to suit, half and hour is 1800 seconds.

sudo defaults write /System/Library/LaunchDaemons/com.apple.backupd-auto StartInterval -int 1800

27) Kill A Process

Sometimes you just need a process to stop running. If you want to kill it in Terminal with out using Activity Monitor, find the process ID (In Activity Monitor) and then use the following command. Only really useful if you don’t like much clicking or are writing a program.

kill PID 478

28) Let Terminal Talk

If you are bored one day you can get Terminal to quickly talk anything back to you using the voice engine. Replace hello with anything you want.

say hello

29) Make Hidden Applications Icons Transparent


If you hide a lot of applications you can make there icons transparent in the dock. A very good visual clue.

defaults write com.apple.Dock showhidden -bool YES
killall Dock

30) Make The Dock Spring Loaded

Makes the dock spring loaded so you can open files or windows from within the dock.

defaults write com.apple.dock enable-spring-load-actions-on-all-items -boolean YES

31) Recent Applications Stack

This command creates a new stack in your dock so you can view the recently used Applications.

defaults write com.apple.dock persistent-others -array-add '{ 'tile-data' = { 'list-type' = 1; }; 'tile-type' = 'recents-tile'; }'

32) Change The Arrows In iTunes

Normally the arrows in iTunes link to the music store, adding this command enables you to search your library. You need to click on the song first for the arrows to appear.

defaults write com.apple.iTunes invertStoreLinks -bool YES

33) Pin The Dock To The Left

This command pins the dock to the left hand side of the screen. I’m not sure what happens if you have the dock on the left or right edge. Replace start with middle to revert.

defaults write com.apple.dock pinning -string start

34) Pin The Dock To The Right

Exactly the same as above except it pins the dock to the right hand side of the screen.

defaults write com.apple.dock pinning -string end

35) Play Star Wars Episode IV


Using a simple telnet address you Terminal will connect in and play Star Wars Episode IV in its ASCII glory.

telnet towel.blinkenlights.nl

36) Quicklook A File

Quicklook is a great little application in Leopard. The command lets you quicklook a file right in Terminal. First you need to change the folder by using the “cd” command and then the folder you want. To enable this command to work you need to type the file name exactly.

qlmanage -p 'Jaguar Aqua Graphite.jpg'

37) Disable The Spotlight Icon

This command removes the spotlight icon. Type 755 to re-enable it, instead of 0.

sudo chmod 0 /System/Library/CoreServices/Spotlight.app
killall Spotlight

38) Remove The Stripes In List View

A simple hack that removes the alternating stripes in list view in finder.

defaults write com.apple.finder FXListViewStripes -bool FALSE
killall Finder

39) Turn The Menu Bar White

If you don’t like the menu bar in its cool transparent glory you can change it so it appears white. This requires a password and you will need to restart you mac.

sudo defaults write /System/Library/LaunchDaemons/com.apple.WindowServer 'EnvironmentVariables' -dict 'CI_NO_BACKGROUND_IMAGE' 1

40) Turn The Menu Bar Grey

If you don’t like the white version of the menu bar you can change it so it appears gret.

sudo defaults write /System/Library/LaunchDaemons/com.apple.WindowServer 'EnvironmentVariables' -dict 'CI_NO_BACKGROUND_IMAGE' 0

41) Revert The Menu Bar Back To Default

If you prefer the transparent menu bar and you want it back type the following into Terminal.

sudo defaults delete /System/Library/LaunchDaemons/com.apple.WindowServer 'EnvironmentVariables'

42) Set The Expanded Print Dialogue As Default

If you want access to a lot of the extra print menus on by default you can use the following command to enable you to do this. Requires restart.

defaults write -g PMPrintingExpandedStateForPrint -bool TRUE

43) Set The Expanded Save Dialogue As Default

Similar as the print dialogue this sets the save dialogue to the expanded view as default. Requires restart.

defaults write -g NSNavPanelExpandedStateForSaveMode -bool TRUE

44) Set The Screen Saver As The Wallpaper


This command sets the currently selected screen saver as the desktop background. Use command + c or . to stop while in Terminal. Alternatively you can use wallsaver.

/System/Library/Frameworks/ScreenSaver.framework/Resources/ScreenSaverEngine.app/Contents/MacOS/ScreenSaverEngine -background

45) Set The History Limit In Safari To A Number Of Items

If you don’t want a massive history you can set it to a limited number of items. Change the number to suit.

defaults write com.apple.Safari WebKitHistoryItemLimit 2000

46) Set The History Limit In Safari To A Number Of Days

Similar to the hack above you can set the number of days Safari keeps its history.

defaults write com.apple.Safari WebKitHistoryAgeInDaysLimit 30

47) Show Hidden Files In Finder


A lot of the files in Finder are hidden. This is probably a wise choice by Apple as there are countless things you can screw up. But if you want to take a look at how many there are and what they are you can show them within Finder. Be careful as these files are needed by the system, if you screw something up don’t come complaining. Repeat the command with false to revert. The image above, click for larger version, show the amount of files there actually is, with these hidden there is only 4 shown normally.

Crosh Commands Hack On Mac Download

defaults write com.apple.finder AppleShowAllFiles TRUE

48) Skip Disk Image Verification

If you want to save some time you can skip the disk image verification for a disk image. Potentially risky as a whole load of things could go wrong without you knowing.

com.apple.frameworks.diskimages skip-verify TRUE

49) Show SubFolders In Graphical Format In Terminal

This is a very cool little hack that enables you to show an ASCII graphical view of sub folders. Use the cd command to change to a directory other wise the command will list every folder. For more information look here.

ls -R | grep ':$' | sed -e 's/:$//' -e 's/[^-][^/]*//--/g' -e 's/^/ /' -e 's/-/|/'

50) Speed Up Dialogue Boxes

Most dialogue boxes have a cool animation effect that looks cool. If you want to speed this up you can change the speed at which is renders so it appears almost instantly. The default is 0.2.

defaults write NSGlobalDomain NSWindowResizeTime 0.01

Thats 50 top Terminal commands, I wanted to go to 100 but I couldn’t find 100 good commands. If you have any tips please leave a comment below explaining what the tips does and why you like it. If you just want to leave a comment you can, just be clear, since garbled comments are hard to understand.

If you want to take your skills with Terminal a bit further I recommend you check out the Terminal Category on this site. If you fancy reading a book there is a couple on Amazon that I regularly see mentioned and recommend, O’reilly Unix Geeks and Unix Under the Hood both are designed for Mac OS X and take Terminal further.

Crosh Commands Hack On Mac Windows 10


If you want to keep up with the latests post from Mac Tricks And Tips I recommend you subscribe to the RSS Feed.

Related posts:

Where To Next?