The new Mac operating system offers more than a name change. MacOS Sierra version 10.12 moves Apple's desktop OS closer to its mobile counterpart, gaining Siri, Apple Pay, and more. After configuring your system open App Store.app and download OS X El Capitan. If you haven't purchased it previously use the answer in How to download OS X El Capitan from the App Store even if never downloaded before macOS Sierra was released or purchased is grayed out.
Link: canonicalLink: amphtmlClose AdLink: http://www.macworld.com* Subscribe▲Learn more about Macworld's Digital Edition Macworld Magazine Cover _____________________ [ search ]
Instructions for making an external drive that you can use to install macOSSierra.
Roman Loyola By Roman Loyola
Senior Editor, Macworld Jul 3, 2017 1:32 PM PT
macos sierra installer iconMore like this* macos high sierra iconHow to create a bootable macOS High Sierra installer drive* imac blank screen stockInstalling macOS or OS X: What to do when ‘the installer payloadfailed..* Mavericks installer iconHow to make a bootable Mavericks install drive* Macworld Podcast Episode 586VideoiMac Pro, Apple and Shazam, holiday wish lists, 2018 predictions:Macworld..
Apple uses its App Store to distribute its software, like new Macoperating systems. It’s convenient, but sometimes it can take a while fora download to finish. And if you have multiple Macs, it’s inefficient todownload the new OS to each and every Mac.
sierra external icon
That’s why I like to make a bootable external drive for the sole purposeof installing the Mac operating system. When I need to tend to a bunch ofMacs, it’s much faster to use a bootable drive instead of going to eachMac, launching the App Store, searching for the operating system,downloading it (after entering my Apple ID), and then running theinstaller.
You can create a bootable USB flash drive with the macOS Sierra installerthat’s now available. The installer software will take up nearly 5GB ofstorage space. Here’s how to create a bootable macOS Sierra installerdrive.
Download the macOS Sierra installer
Launch the App Store app, then look for macOS Sierra in the store. (Here’sa link.) Click on the Download button, and your Mac will download theinstaller to your Applications folder. If it automatically launches afterdownload, quit the installer.
sierra beta installer app folder sierra gmKeep the installer in theApplications folder.
If you’ve already upgraded your Mac to Sierra, the installer is removedfrom the Applications folder. You can download it again if you go toPurchased in the App Store. Look for macOS Sierra in the list of apps thatyou’ve bought, and click on the Download button. If it automaticallylaunches after download, quit the installer.
Get an external drive
You can use a USB flash drive or a hard drive with room for the installersoftware. I’ve used different drives with success, including a VisionTek120GB USB 3.0 Pocket Solid State Drive ($83 on Amazon) and an old 8GBIomega Micro Mini Hard Drive.
Don’t worry if the drive isn’t formatted for the Mac. The drive will bereformatted automatically as part of the process. Change the name of yourdrive to Untitled; you need to do this for the steps below.
The quick and easy way
The process detailed below involves the Terminal. If your really don’twant to use Terminal, there are a couple of free apps you can use.
Use the Terminal to create a boot disk
terminal mac el capitan icon
So you have your external drive, and the Sierra beta installer is inplace. Now you’re going to use Terminal to create a boot drive. If you’venever used Terminal before, don’t worry. This is pretty easy.
Here are the steps to create a macOS Sierra beta boot disk. (Apple alsohas these instructions.)
How to boot from the installer drive
sierra installstartup option
To comment on this article and other Macworld content, visit our Facebookpage or our Twitter feed.Related:* Macs* Operating Systems* MacOS Hints* MacBooks* Mac Desktops* macOS* MacOS Sierra
Roman has covered technology since the early 1990s. His career started atMacUser, and he's worked for MacAddict, Mac Life, and TechTV. He's alsowritten for MacRumors and Realtor.com.
Follow* * * * You Might LikeShop Tech Products at AmazonMacworld
Macworld is your best source for all things Apple. We give you the scoopon what's new, what's best and how to make the most out of the productsyou love.
Macworld Categories
IDG Network Sites
Macworld Magazine Cover
Try Macworld Risk-Free
Subscribe NowFollow us
Visit other IDG sites:
[ ] Select One[ ] CIO[ ] Computerworld[ ] CSO[ ] Gamestar[ ] Greenbot[ ] IDG Connect[ ] IDG.tv[ ] InfoWorld[ ] IT News[ ] ITworld[ ] JavaWorld[ ] Macworld[ ] Network World[ ] PCWorld[ ] TechHive[ ] The Industry Standard
Copyright © 2018 IDG Communications, Inc.
IFrame: __bkframe
Apple starts rolling out latest updates for the entire suite of operating systems. After beta testing, the final versions including macOS High Sierra 10.13.3, iOS 11.2.5, and watchOS 4.2.2 are released officially. If you want to update multiple macOS systems, you can download macOS High Sierra 10.13.3 Offline Installer using direct download links. The latest build ships with version 17D47 or 17D2047 (depending on the machine).
The latest macOS High Sierra 10.13.3 addressed a problem in Messages where the conversation is listed out of order. Moreover, it also addressed an issue that could cause your Mac to stop responding when connected to an SMB server.
You can get macOS High Sierra 10.13.3 either through Mac App Store or download macOS High Sierra 10.13.3 DMG file using official links provided in this post.
“The macOS High Sierra 10.13.3 Update improves the stability and security of your Mac and is recommended for all users”, Apple says.
/download-all-one-piece-manga.html. Audio
Available for: macOS High Sierra 10.13.2, macOS Sierra 10.12.6
Impact: Processing a maliciously crafted audio file may lead to arbitrary code execution
Description: A memory corruption issue was addressed through improved input validation.
CVE-2018-4094: Mingi Cho, MinSik Shin, Seoyoung Kim, Yeongho Lee and Taekyoung Kwon of the Information Security Lab, Yonsei University
curl
Available for: macOS High Sierra 10.13.2
Impact: Multiple issues in curl
Description: An out-of-bounds read issue existed in the curl. This issue was addressed through improved bounds checking.
CVE-2017-8817: found by OSS-Fuzz
IOHIDFamily
Available for: macOS High Sierra 10.13.2, macOS Sierra 10.12.6, OS X El Capitan 10.11.6
Impact: An application may be able to execute arbitrary code with kernel privileges
Description: A memory corruption issue was addressed with improved memory handling.
CVE-2018-4098: Siguza
Kernel
Available for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6
Impact: An application may be able to read kernel memory (Meltdown)
Description: Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.
CVE-2017-5754: Jann Horn of Google Project Zero; Moritz Lipp of Graz University of Technology; Michael Schwarz of Graz University of Technology; Daniel Gruss of Graz University of Technology; Thomas Prescher of Cyberus Technology GmbH; Werner Haas of Cyberus Technology GmbH; Stefan Mangard of Graz University of Technology; Paul Kocher; Daniel Genkin of University of Pennsylvania and University of Maryland; Yuval Yarom of University of Adelaide and Data61; and Mike Hamburg of Rambus (Cryptography Research Division)
Kernel
Available for: macOS High Sierra 10.13.2
Impact: An application may be able to read restricted memory
Description: A memory initialization issue was addressed through improved memory handling.
CVE-2018-4090: Jann Horn of Google Project Zero
Kernel
Available for: macOS High Sierra 10.13.2
Impact: An application may be able to read restricted memory
Description: A race condition was addressed through improved locking.
CVE-2018-4092: an anonymous researcher
Kernel
Available for: macOS High Sierra 10.13.2, macOS Sierra 10.12.6, OS X El Capitan 10.11.6
Impact: A malicious application may be able to execute arbitrary code with kernel privileges
Description: A memory corruption issue was addressed through improved input validation.
CVE-2018-4082: Russ Cox of Google
Kernel
Available for: macOS High Sierra 10.13.2, macOS Sierra 10.12.6
Impact: An application may be able to execute arbitrary code with kernel privileges
Description: A logic issue was addressed with improved validation.
CVE-2018-4097: Resecurity, Inc.
Kernel
Available for: macOS High Sierra 10.13.2
Impact: An application may be able to read restricted memory
Description: A validation issue was addressed with improved input sanitization.
CVE-2018-4093: Jann Horn of Google Project Zero
LinkPresentation
Available for: macOS High Sierra 10.13.2, macOS Sierra 10.12.6.2
Impact: Processing a maliciously crafted text message may lead to application denial of service
Description: A resource exhaustion issue was addressed through improved input validation.
CVE-2018-4100: Abraham Masri (@cheesecakeufo)
QuartzCore
Available for: macOS High Sierra 10.13.2, macOS Sierra 10.12.6, OS X El Capitan 10.11.6
Impact: Processing maliciously crafted web content may lead to arbitrary code execution
Description: A memory corruption issue existed in the processing of web content. This issue was addressed through improved input validation.
CVE-2018-4085: Ret2 Systems Inc. working with Trend Micro’s Zero Day Initiative
Sandbox
Available for: macOS High Sierra 10.13.2
Impact: A sandboxed process may be able to circumvent sandbox restrictions
Description: An access issue was addressed through additional sandbox restrictions.
CVE-2018-4091: Alex Gaynor of Mozilla
Security
Available for: macOS High Sierra 10.13.2, macOS Sierra 10.12.6
Impact: A certificate may have name constraints applied incorrectly
Description: A certificate evaluation issue existed in the handling of name constraints. This issue was addressed through improved trust evaluation of certificates.
CVE-2018-4086: Ian Haken of Netflix
WebKit
Available for: macOS High Sierra 10.13.2
Impact: Processing maliciously crafted web content may lead to arbitrary code execution
Description: Multiple memory corruption issues were addressed with improved memory handling.
CVE-2018-4088: Jeonghoon Shin of Theori
CVE-2018-4089: Ivan Fratric of Google Project Zero
CVE-2018-4096: found by OSS-Fuzz
Wi-Fi
Available for: macOS High Sierra 10.13.2, macOS Sierra 10.12.6, OS X El Capitan 10.11.6
Impact: An application may be able to read restricted memory
Description: A validation issue was addressed with improved input sanitization.
CVE-2018-4084: Hyung Sup Lee of Minionz, You Chan Lee of Hanyang University
macOS High Sierra 10.13.3 DMG – Download (Size: 1.9 GB)
Security Update 2018-001 macOS Sierra DMG – Download (Size: 731 MB)
Security Update 2018-001 (El Capitan) OS X – Download (Size: 823 MB)