Friday, July 25, 2014

Show the Size of Selected Files on Mac OS X


Show the Size of Selected Files on Mac OS X

Here’s a quick tip to show the file size of selected files/folders.  Generally the status bar of the Finder windows shows the count of selected files and the available hard drive space, but doesn’t show the file size.  On a single file you can right-click the file and select ‘Get Info’ (Apple/Command+i) which will pop-up the ‘Get Info’ floating window, but this is no good for multiple file selection.
To get the file size of selected files/folders instead of ‘Get Info’, use ‘Show Inspector’.  This is done the same way you would go to ‘Get Info’, except hold down Alt/Option key before you click. ‘Get Info’ will turn into ‘Show Inspector’ in the context menu.  Once clicked a floating window appears, so you can continue clicking your Finder windows and icons and it will stay on top. It will also update as you select new files.
  1. Open up a Finder window (Applications folder will provide the best example.)
  2. Right-click a file/program
  3. Hold Alt/Option
  4. Choose ‘Show Inspector’
  5. Now hold Apple/Command and click other files. They will be added to the selection and therefore the Inspector window.
Keyboard shortcut:
Apple/Command+i = Get Info
Alt/Option+Apple/Command+i = Show Inspector

Monday, July 21, 2014

20 Linux Server Hardening Security Tips


Securing your Linux server is important to protect your data, intellectual property, and time, from the hands of crackers (hackers). The system administrator is responsible for security Linux box. In this first part of a Linux server security series, I will provide 20 hardening tips for default installation of Linux system.

Linux Server Hardening Checklist and Tips

The following instructions assume that you are using CentOS/RHEL or Ubuntu/Debian based Linux distribution.

#1: Encrypt Data Communication

All data transmitted over a network is open to monitoring. Encrypt transmitted data whenever possible with password or using keys / certificates.
  1. Use scp, ssh, rsync, or sftp for file transfer. You can also mount remote server file systemor your own home directory using special sshfs and fuse tools.
  2. GnuPG allows to encrypt and sign your data and communication, features a versatile key managment system as well as access modules for all kind of public key directories.
  3. Fugu is a graphical frontend to the commandline Secure File Transfer application (SFTP). SFTP is similar to FTP, but unlike FTP, the entire session is encrypted, meaning no passwords are sent in cleartext form, and is thus much less vulnerable to third-party interception. Another option is FileZilla - a cross-platform client that supports FTP, FTP over SSL/TLS (FTPS), and SSH File Transfer Protocol (SFTP).
  4. OpenVPN is a cost-effective, lightweight SSL VPN.
  5. Lighttpd SSL (Secure Server Layer) Https Configuration And Installation
  6. Apache SSL (Secure Server Layer) Https (mod_ssl) Configuration And Installation

#1.1: Avoid Using FTP, Telnet, And Rlogin / Rsh Services

Under most network configurations, user names, passwords, FTP / telnet / rsh commands and transferred files can be captured by anyone on the same network using a packet sniffer. The common solution to this problem is to use either OpenSSH , SFTP, or FTPS (FTP over SSL), which adds SSL or TLS encryption to FTP. Type the following command to delete NIS, rsh and other outdated service:
# yum erase inetd xinetd ypserv tftp-server telnet-server rsh-serve

#2: Minimize Software to Minimize Vulnerability

Do you really need all sort of web services installed? Avoid installing unnecessary software to avoid vulnerabilities in software. Use the RPM package manager such as yum or apt-get and/or dpkg to review all installed set of software packages on a system. Delete all unwanted packages.
# yum list installed
# yum list packageName
# yum remove packageName

OR
# dpkg --list
# dpkg --info packageName
# apt-get remove packageName

#3: One Network Service Per System or VM Instance

Run different network services on separate servers or VM instance. This limits the number of other services that can be compromised. For example, if an attacker able to successfully exploit a software such as Apache flow, he / she will get an access to entire server including other services such as MySQL, e-mail server and so on. See how to install Virtualization software:

#4: Keep Linux Kernel and Software Up to Date

Applying security patches is an important part of maintaining Linux server. Linux provides all necessary tools to keep your system updated, and also allows for easy upgrades between versions. All security update should be reviewed and applied as soon as possible. Again, use the RPM package manager such as yum and/or apt-get and/or dpkg to apply all security updates.
# yum update
OR
# apt-get update && apt-get upgrade
You can configure Red hat / CentOS / Fedora Linux to send yum package update notification via email. Another option is to apply all security updates via a cron job. Under Debian / Ubuntu Linux you can use apticron to send security notifications.

#5: Use Linux Security Extensions

Linux comes with various security patches which can be used to guard against misconfigured or compromised programs. If possible use SELinux and other Linux security extensions to enforce limitations on network and other programs. For example, SELinux provides a variety of security policies for Linux kernel.

#5.1: SELinux

I strongly recommend using SELinux which provides a flexible Mandatory Access Control (MAC). Under standard Linux Discretionary Access Control (DAC), an application or process running as a user (UID or SUID) has the user's permissions to objects such as files, sockets, and other processes. Running a MAC kernel protects the system from malicious or flawed applications that can damage or destroy the system. See the official Redhat documentation which explains SELinux configuration.

#6: User Accounts and Strong Password Policy

Use the useradd / usermod commands to create and maintain user accounts. Make sure you have a good and strong password policy. For example, a good password includes at least 8 characters long and mixture of alphabets, number, special character, upper & lower alphabets etc. Most important pick a password you can remember. Use tools such as "John the ripper" to find out weak users passwords on your server. Configure pam_cracklib.so to enforce the password policy.

#6.1: Password Aging

The chage command changes the number of days between password changes and the date of the last password change. This information is used by the system to determine when a user must change his/her password. The /etc/login.defs file defines the site-specific configuration for the shadow password suite including password aging configuration. To disable password aging, enter:
chage -M 99999 userName
To get password expiration information, enter:
chage -l userName
Finally, you can also edit the /etc/shadow file in the following fields:
{userName}:{password}:{lastpasswdchanged}:{Minimum_days}:{Maximum_days}:{Warn}:{Inactive}:{Expire}:
Where,
  1. Minimum_days: The minimum number of days required between password changes i.e. the number of days left before the user is allowed to change his/her password.
  2. Maximum_days: The maximum number of days the password is valid (after that user is forced to change his/her password).
  3. Warn : The number of days before password is to expire that user is warned that his/her password must be changed.
  4. Expire : Days since Jan 1, 1970 that account is disabled i.e. an absolute date specifying when the login may no longer be used.
I recommend chage command instead of editing the /etc/shadow by hand:
# chage -M 60 -m 7 -W 7 userName
Recommend readings:

#6.2: Restricting Use of Previous Passwords

You can prevent all users from using or reuse same old passwords under Linux. Thepam_unix module parameter remember can be used to configure the number of previous passwords that cannot be reused.

#6.3: Locking User Accounts After Login Failures

Under Linux you can use the faillog command to display faillog records or to set login failure limits. faillog formats the contents of the failure log from /var/log/faillog database / log file. It also can be used for maintains failure counters and limits.To see failed login attempts, enter:
faillog
To unlock an account after login failures, run:
faillog -r -u userName
Note you can use passwd command to lock and unlock accounts:
# lock account
passwd -l userName
# unlocak account
passwd -u userName

#6.4: How Do I Verify No Accounts Have Empty Passwords?

Type the following command
# awk -F: '($2 == "") {print}' /etc/shadow
Lock all empty password accounts:
# passwd -l accountName

#6.5: Make Sure No Non-Root Accounts Have UID Set To 0

Only root account have UID 0 with full permissions to access the system. Type the following command to display all accounts with UID set to 0:
# awk -F: '($3 == "0") {print}' /etc/passwd
You should only see one line as follows:
root:x:0:0:root:/root:/bin/bash
If you see other lines, delete them or make sure other accounts are authorized by you to use UID 0.

#7: Disable root Login

Never ever login as root user. You should use sudo to execute root level commands as and when required. sudo does greatly enhances the security of the system without sharing root password with other users and admins. sudo provides simple auditing and tracking features too.

#8: Physical Server Security

You must protect Linux servers physical console access. Configure the BIOS and disable the booting from external devices such as DVDs / CDs / USB pen. Set BIOS and grub boot loader password to protect these settings. All production boxes must be locked in IDCs (Internet Data Center) and all persons must pass some sort of security checks before accessing your server. See also:

#9: Disable Unwanted Services

Disable all unnecessary services and daemons (services that runs in the background). You need to remove all unwanted services from the system start-up. Type the following command to list all services which are started at boot time in run level # 3:
# chkconfig --list | grep '3:on'
To disable service, enter:
# service serviceName stop
# chkconfig serviceName off

#9.1: Find Listening Network Ports

Use the following command to list all open ports and associated programs:
netstat -tulpn
OR
nmap -sT -O localhost
nmap -sT -O server.example.com

Use iptables to close open ports or stop all unwanted network services using above service and chkconfig commands.

#9.2: See Also

#10: Delete X Windows

X Windows on server is not required. There is no reason to run X Windows on your dedicated mail and Apache web server. You can disable and remove X Windows to improve server security and performance. Edit /etc/inittab and set run level to 3. Finally, remove X Windows system, enter:
yum groupremove "X Window System"

#11: Configure Iptables and TCPWrappers

Iptables is a user space application program that allows you to configure the firewall (Netfilter) provided by the Linux kernel. Use firewall to filter out traffic and allow only necessary traffic. Also use the TCPWrappers a host-based networking ACL system to filter network access to Internet. You can prevent many denial of service attacks with the help of Iptables:

#12: Linux Kernel /etc/sysctl.conf Hardening

/etc/sysctl.conf file is used to configure kernel parameters at runtime. Linux reads and applies settings from /etc/sysctl.conf at boot time. Sample /etc/sysctl.conf:
# Turn on execshield
kernel.exec-shield=1
kernel.randomize_va_space=1
# Enable IP spoofing protection
net.ipv4.conf.all.rp_filter=1
# Disable IP source routing
net.ipv4.conf.all.accept_source_route=0
# Ignoring broadcasts request
net.ipv4.icmp_echo_ignore_broadcasts=1
net.ipv4.icmp_ignore_bogus_error_messages=1
# Make sure spoofed packets get logged
net.ipv4.conf.all.log_martians = 1

#13: Separate Disk Partitions

Separation of the operating system files from user files may result into a better and secure system. Make sure the following filesystems are mounted on separate partitions:
  • /usr
  • /home
  • /var and /var/tmp
  • /tmp
Create separate partitions for Apache and FTP server roots. Edit /etc/fstab file and make sure you add the following configuration options:
  1. noexec - Do not set execution of any binaries on this partition (prevents execution of binaries but allows scripts).
  2. nodev - Do not allow character or special devices on this partition (prevents use of device files such as zero, sda etc).
  3. nosuid - Do not set SUID/SGID access on this partition (prevent the setuid bit).
Sample /etc/fstab entry to to limit user access on /dev/sda5 (ftp server root directory):
/dev/sda5  /ftpdata          ext3    defaults,nosuid,nodev,noexec 1 2

#13.1: Disk Quotas

Make sure disk quota is enabled for all users. To implement disk quotas, use the following steps:
  1. Enable quotas per file system by modifying the /etc/fstab file.
  2. Remount the file system(s).
  3. Create the quota database files and generate the disk usage table.
  4. Assign quota policies.
  5. See implementing disk quotas tutorial for further details.

#14: Turn Off IPv6

Internet Protocol version 6 (IPv6) provides a new Internet layer of the TCP/IP protocol suite that replaces Internet Protocol version 4 (IPv4) and provides many benefits. Currently there are no good tools out which are able to check a system over network for IPv6 security issues. Most Linux distro began enabling IPv6 protocol by default. Crackers can send bad traffic via IPv6 as most admins are not monitoring it. Unless network configuration requires it, disable IPv6 or configure Linux IPv6 firewall:

#15: Disable Unwanted SUID and SGID Binaries

All SUID/SGID bits enabled file can be misused when the SUID/SGID executable has a security problem or bug. All local or remote user can use such file. It is a good idea to find all such files. Use the find command as follows:
#See all set user id files:
find / -perm +4000
# See all group id files
find / -perm +2000
# Or combine both in a single command
find / \( -perm -4000 -o -perm -2000 \) -print
find / -path -prune -o -type f -perm +6000 -ls

You need to investigate each reported file. See reported file man page for further details.

#15.1: World-Writable Files

Anyone can modify world-writable file resulting into a security issue. Use the following command to find all world writable and sticky bits set files:
find /dir -xdev -type d \( -perm -0002 -a ! -perm -1000 \) -print
You need to investigate each reported file and either set correct user and group permission or remove it.

#15.2: Noowner Files

Files not owned by any user or group can pose a security problem. Just find them with the following command which do not belong to a valid user and a valid group
find /dir -xdev \( -nouser -o -nogroup \) -print
You need to investigate each reported file and either assign it to an appropriate user and group or remove it.

#16: Use A Centralized Authentication Service

Without a centralized authentication system, user auth data becomes inconsistent, which may lead into out-of-date credentials and forgotten accounts which should have been deleted in first place. A centralized authentication service allows you maintaining central control over Linux / UNIX account and authentication data. You can keep auth data synchronized between servers. Do not use the NIS service for centralized authentication. Use OpenLDAP for clients and servers.

#16.1: Kerberos

Kerberos performs authentication as a trusted third party authentication service by using cryptographic shared secret under the assumption that packets traveling along the insecure network can be read, modified, and inserted. Kerberos builds on symmetric-key cryptography and requires a key distribution center. You can make remote login, remote copy, secure inter-system file copying and other high-risk tasks safer and more controllable using Kerberos. So, when users authenticate to network services using Kerberos, unauthorized users attempting to gather passwords by monitoring network traffic are effectively thwarted. See how to setup and use Kerberos.

#17: Logging and Auditing

You need to configure logging and auditing to collect all hacking and cracking attempts. By default syslog stores data in /var/log/ directory. This is also useful to find out software misconfiguration which may open your system to various attacks. See the following logging related articles:
  1. Linux log file locations.
  2. How to send logs to a remote loghost.
  3. How do I rotate log files?.
  4. man pages syslogd, syslog.conf and logrotate.

#17.1: Monitor Suspicious Log Messages With Logwatch / Logcheck

Read your logs using logwatch or logcheck. These tools make your log reading life easier. You get detailed reporting on unusual items in syslog via email. A sample syslog report:
 ################### Logwatch 7.3 (03/24/06) ####################
        Processing Initiated: Fri Oct 30 04:02:03 2009
        Date Range Processed: yesterday
                              ( 2009-Oct-29 )
                              Period is day.
      Detail Level of Output: 0
              Type of Output: unformatted
           Logfiles for Host: www-52.nixcraft.net.in
  ##################################################################
 --------------------- Named Begin ------------------------
 **Unmatched Entries**
    general: info: zone XXXXXX.com/IN: Transfer started.: 3 Time(s)
    general: info: zone XXXXXX.com/IN: refresh: retry limit for master ttttttttttttttttttt#53 exceeded (source ::#0): 3 Time(s)
    general: info: zone XXXXXX.com/IN: Transfer started.: 4 Time(s)
    general: info: zone XXXXXX.com/IN: refresh: retry limit for master ttttttttttttttttttt#53 exceeded (source ::#0): 4 Time(s)
 ---------------------- Named End -------------------------
  --------------------- iptables firewall Begin ------------------------
 Logged 87 packets on interface eth0
   From 58.y.xxx.ww - 1 packet to tcp(8080)
   From 59.www.zzz.yyy - 1 packet to tcp(22)
   From 60.32.nnn.yyy - 2 packets to tcp(45633)
   From 222.xxx.ttt.zz - 5 packets to tcp(8000,8080,8800)
 ---------------------- iptables firewall End -------------------------
 --------------------- SSHD Begin ------------------------
 Users logging in through sshd:
    root:
       123.xxx.ttt.zzz: 6 times
 ---------------------- SSHD End -------------------------
 --------------------- Disk Space Begin ------------------------
 Filesystem            Size  Used Avail Use% Mounted on
 /dev/sda3             450G  185G  241G  44% /
 /dev/sda1              99M   35M   60M  37% /boot
 ---------------------- Disk Space End -------------------------
 ###################### Logwatch End #########################
(Note output is truncated)

#17.2: System Accounting with auditd

The auditd is provided for system auditing. It is responsible for writing audit records to the disk. During startup, the rules in /etc/audit.rules are read by this daemon. You can open /etc/audit.rules file and make changes such as setup audit file log location and other option. With auditd you can answers the following questions:
  1. System startup and shutdown events (reboot / halt).
  2. Date and time of the event.
  3. User respoisble for the event (such as trying to access /path/to/topsecret.dat file).
  4. Type of event (edit, access, delete, write, update file & commands).
  5. Success or failure of the event.
  6. Records events that Modify date and time.
  7. Find out who made changes to modify the system's network settings.
  8. Record events that modify user/group information.
  9. See who made changes to a file etc.
See our quick tutorial which explains enabling and using the auditd service.

#18: Secure OpenSSH Server

The SSH protocol is recommended for remote login and remote file transfer. However, ssh is open to many attacks. See how to secure OpenSSH server:

#19: Install And Use Intrusion Detection System

A network intrusion detection system (NIDS) is an intrusion detection system that tries to detect malicious activity such as denial of service attacks, port scans or even attempts to crack into computers by monitoring network traffic.
It is a good practice to deploy any integrity checking software before system goes online in a production environment. If possible install AIDE software before the system is connected to any network. AIDE is a host-based intrusion detection system (HIDS) it can monitor and analyses the internals of a computing system.
Snort is a software for intrusion detection which is capable of performing packet logging and real-time traffic analysis on IP networks.

#20: Protecting Files, Directories and Email

Linux offers excellent protections against unauthorized data access. File permissions and MAC prevent unauthorized access from accessing data. However, permissions set by the Linux are irrelevant if an attacker has physical access to a computer and can simply move the computer's hard drive to another system to copy and analyze the sensitive data. You can easily protect files, and partitons under Linux using the following tools:

#20.1: Securing Email Servers

You can use SSL certificates and gpg keys to secure email communication on both server and client computers:

Other Recommendation:

Recommend readings:

  1. Red Hat Enterprise Linux - Security Guide.
  2. Linux security cookbook- A good collections of security recipes for new Linux admin.
  3. Snort 2.1 Intrusion Detection, Second Edition - Good introduction to Snort and Intrusion detection under Linux.
  4. Hardening Linux - Hardening Linux identifies many of the risks of running Linux hosts and applications and provides practical examples and methods to minimize those risks.
  5. Linux Security HOWTO.
In the next part of this series I will discuss how to secure specific applications (such as Proxy, Mail, LAMP, Database) and a few other security tools. Did I miss something? Please add your favorite system security tool or tip in the comments.

Mac OS X Finder Keyboard Shortcuts, a maintenance checklist, and a "translation" of the modifier keys

Mac OS X Finder Keyboard Shortcuts

The Mac OS X Lion Finder helps you access and organize most of the important Mac OS X functions while you work. Use Finder keyboard shortcuts to display windows, copy and move files, and launch applications. These keyboard shortcuts help you get things done more efficiently.
KeyFunction
Command+ASelects all items in the active window (icon view), all items in the column (column view), or all items in the list (cover flow view)
Command+CCopies selected items
Command+DDuplicates the selected item(s)
Command+EEjects the selected volume
Command+FDisplays the Find dialog
Command+HHides All Finder windows
Command+IShows info for selected item or items
Command+JShows the view options for the active window
Command+KDisplays the Connect to Server dialog
Command+LCreates an alias for the selected item
Command+MMinimizes the active window
Command+NOpens a new Finder window
Command+OOpens (or launches) the selected item
Command+RShows the original for selected alias
Command+TAdds the selected item to the Sidebar
Command+VPastes items from the Clipboard
Command+WCloses the active window
Command+XCuts the selected items
Command+ZUndoes the last action (if possible)
Command+,Displays Finder Preferences
Command+1Shows the active window in icon mode
Command+2Shows the active window in list mode
Command+3Shows the active window in column mode
Command+4Shows the active window in cover flow mode
Command+[Moves back to the previous Finder location
Command+]Moves forward to the next Finder location
Command+DelMoves selected items to the Trash
Command+up-arrowShow enclosing folder
Command+`Cycles through windows
Command+?Displays the Mac OS X Help Viewer
Command+Shift+ATakes you to your Applications folder
Command+Shift+CTakes you to the top-level Computer location
Command+Shift+GTakes you to a folder that you specify
Command+Shift+HTakes you to your Home folder
Command+Shift+IConnects you to your iDisk
Command+Shift+QLogs you out
Command+Shift+NCreates a new untitled folder in the active window
Command+Shift+UTakes you to your Utilities folder
Command+Shift+DelDeletes the contents of the Trash
Command+Option+HHides all windows except the Finder's window(s)
Command+Option+NCreates a new Smart Folder
Command+Option+THides the Finder window toolbar
Command+Option+SpaceOpens the Spotlight window
Command+SpaceOpens the Spotlight menu
F8Choose another desktop using Spaces
Control+up-arrow (or F3, depending on your keyboard model)Displays the Mission Control screen
Control+down-arrow (or Control+F3, depending on your keyboard model)Shows all open windows for the current application using Mission Control
F11 (or Command+F3, depending on your keyboard model)Hides all windows to display the Desktop using Mission Control
F12 (or F4, depending on your keyboard model)Displays your Dashboard widgets
SpaceQuick Look

Strange-Looking Keys on the MacBook Keyboard

New to the Macintosh world? Some keys on the MacBook keyboard may be mystifying. Whether you're using Snow Leopard or an older version of Mac OS X, recognizing and using modifier keys will make your job easier. Here's a look at the modifier keys on both MacBook and desktop keyboards:
image0.jpg

Mac OS X Maintenance Checklist

Maintenance is vital if you want to keep Mac OS X Lion in tip-top condition for as long as possible. Maintaining your MacBook keeps it running fast and smooth. Basic housekeeping includes regular back-ups plus some other, less familiar, tasks. Check this table often, or print it and keep a copy near your laptop!
Mac Maintenance TaskSchedule
Check for updates with Software UpdateOnce a day (automatic setting)
Back up with Time MachineAutomatic
Defragment (Micromat TechTool Pro/Prosoft Engineering Drive Genius 3)Once a week
Repair Disk Permissions (Disk Utility)Once a week
Delete Unnecessary User Accounts (System Preferences)As necessary
Scan for viruses (Intego VirusBarrier X6, ClamXav 2)Automatic
Check all volumes (Disk Utility/ Micromat TechTool Pro)Once a week
Check for the latest drivers for your hardwareOnce a month (or after installing new hardware)
Delete temporary Internet cache files (Prosoft Engineering Drive Genius 3)Once a month

Friday, July 4, 2014

Getting the ATEN USB Serial Adapter Working with Mac OSX Lion / Mavericks


ATEN USB Serial Adapter
I’ve had this USB Serial adapter for many years which I use to attach to network equipment consoles for initial configuration and setup. I have never had an issue using it with Windows machines. However, I had tried using it on my Macbook running OSX Lion and noticed that it did not show up in my device list in ZTerm. I had a VM running Windows XP and I was not able to get it to work properly in that environment either. So, I was determined to figure out how to get it to work, as I no longer have any physical machines running Windows or with serial ports. It took me a few weeks of trial and error and searching around to finally resolve the issue. So, I thought I would add a post here covering the details.
The first challenge was that I did not even know the manufacturer or part number of this particular USB Serial adapter. That was solved easily enough by plugging it into my Macbook and opening up the ‘About This Mac’ option on the Apple menu and clicking the More Info… button and then the System Report button. I drilled into the USB menu option and found the device listed as ‘Composite Device’. I highlighted it in the USB Device Tree and found this:
Composite Device:
Product ID: 0×2008
Vendor ID: 0×0557 (ATEN International Co. Ltd.)
Version: 0.01
Speed: Up to 12 Mb/sec
Location ID: 0xfd120000 / 4
Current Available (mA): 500
Current Required (mA): 100
So, now I know that it is made by ATEN International Co. Ltd. So I do a quick Google search looking for any info on this product. I find out that ATEN has basically disappeared. However, I did discover a number of posts referring to a company by the name of Prolific having a product that was 100% compatible if not identical to this particular ATEN device.
So, I did some more searching, looking for people having problems getting this working with Mac OSX Lion. I find a post that mentions that because this particular adapter was only supported with the original 32 bit drivers that Lion essentially disabled support because of the default 64 bit subsystem. So, now I know why it isn’t working. The question is can I actually get a driver that supports Lion in 64 bit mode for this adapter. Thankfully, the answer is yes. Prolific Technology’s PL2303 device is essentially the same product as the ATEN UC232A adapter. So, you can use the same Mac OSX driver they distribute which happens to support Lion.
Download and Install Drivers
  1. Go to Prolific’s download page and download the latest Mac OS X drivers.
  2. Open the Zip File
  3. Mount the Disk Image
  4. Open the Installer Package and install the drivers
  5. Reboot
Change Kernel Extension Property List
  1. Plug your USB adapter into any available USB port on your Mac
  2. Open the System Profiler/System Information, in /Application -> Utilites
  3. Click USB in the Contents pane
  4. Select the GUC232A in the Device Tree; usually it will be listed under USB-Serial Controller or in my case it was listed as Composite Device
  5. Remember the ProductID and VendorID, or keep the System Profiler window open
  6. Open the Terminal, in /Application -> Utilites
  7. Use the following command to open the Property List of the Prolific driver:
    sudo nano /System/Library/Extensions/ProlificUsbSerial.kext/Contents/Info.plist
  8. Enter your admin password when asked. This is necessary; the ProlificUsbSerial kernel extension is owned by root.
  9. Scroll down and find the ProductID and VendorID in the plist file which are labeled idProduct and idVendor
  10. Change the ProductID and VendorID to match your GUC232A’s ProductID and VendorID
  11. The plist file needs the numbers as integer values, but System Profiler reports the numbers as hex. Use the Calculator to convert the numbers. System Profiler reports the Product ID as 0×2008 and the Vendor ID as 0×0557. The integer value of ProductID is 8200 and the integer value of VendorID is 1367
  12. Save the changes and quit (Control-X) nano
Reload Kernel Extension
  1. Unplug the GUC232A
  2. Use the following command to load the kernel extension:
    sudo kextload /System/Library/Extensions/ProlificUsbSerial.kext
  3. Plug the GUC232A into any available USB port on your Mac
Once you’ve completed these steps and you have the adapter plugged in, you should see a file called tty.usbserial in your /dev folder. Now the adapter should be functional. I use ZTerm to access the serial devices. The USB Serial device shows up in the drop down list of devices under the Modem communications menu.