Moving Stickies widget information to a new user or Mac OS X system

Here is how to move your Dashboard Stickies widget information to a new user or a new Mac OS X system. All the text you wrote on the Stickies is contained in the /Users/[your_username]/Library/Preferences/widget-com.apple.widget.stickies.plist file.

First, you’ll need to copy that file someplace visible so you can transfer it to the other location.

Continue reading

Make a local snapshot using MobileBackups on Mac OS X Lion

Mac OS X Lion introduced MobileBackups, a new TimeMachine feature that stores local backups of your files while you are away from your main TimeMachine backup disk. This feature stores filesystem snapshots inside a virtual drive on your local disk, so should not be considered as a main backup strategy. The system automatically does periodic snapshots, but you can also manually initiate the process.

To make a local snapshot of the current state of your files, enter this command in your Terminal window:

sudo tmutil snapshot

It should complete almost instantaneously, giving you a tick in the TimeMachine backups timeline.

 

Disable TimeMachine local backups on Mac OS X Lion

Mac OS X Lion introduces a new TimeMachine backup feature for the MacBook Air and Pro notebooks, called MobileBackups. It is a local version of TimeMachine backups that enables local snapshots of your data while you’re mobile and away from your main TimeMachine backups. On the TimeMachine timeline screen, local backups are shown as white ticks, while main backups are purple.

This is a neat feature, however it eats up your hard disk space and can grow to tens of gigabytes very fast. Thankfully, you can disable it permanently or temporarily by using the tmutil program.

Continue reading

Monitoring disk I/O on MacOS X with iosnoop, fs_usage and iotop

MacOS X comes with great command line programs for debugging and troubleshooting various issues with your system. If you ever need to check what program is accessing your disk, use these three programs: iosnoop, fs_usage and iotop.

All require the sudo password, as they tap deep into your kernel to get the information.

Continue reading