Solved

/Library/Preferences and /Users/<username>/Library/Preferences

Posted on 2011-03-09
3
1,012 Views
Last Modified: 2012-05-11
what is difference between

/Library/Preferences

and

/Users/<username>/Library/Preferences


0
Comment
Question by:aashee
  • 2
3 Comments
 
LVL 8

Expert Comment

by:Mac2010
ID: 35085185
> /Users/<username>/Library/Preferences (or ~/Library/Preferences)

This is where preferences are stored for each individual user account, that apply to that individual account only

> /Library/Preferences

Here are preferences stored, that apply to all user accounts

Please let us know if you need more clarification on this!
0
 

Author Comment

by:aashee
ID: 35085302
actually i want to put a script that will run when every user logs in .
and it will delete .ds_store and disable it for network.
please help, how is it the best way to achive
0
 
LVL 8

Accepted Solution

by:
Mac2010 earned 500 total points
ID: 35085422
It's quite some time ago I've been doing this kind of thing, in everyday life I rarely need it. If I remember correct, you need to put files in the "LaunchAgents" and Preferences for that. And create those with Plist Editor (part of Apple's developer tools). The 'launchd' process runs the scripts.

Login scripts are covered in this book, in case you're looking for a manual http://www.amazon.com/Apple-Training-Advanced-System-Administration/dp/032156314X
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Information security is a multi-billion dollar industry. Just as lucrative is the black market industry which trades stolen identities, credit card numbers and software exploits all over the world. Nothing is hack-proof. The best one can do is make …
This article describes in detail how to set up the iPad in the Enterprise using iPCU aka iPhone Configuration Utility.  This could also be used for the iPhone although I have not detailed out any differences. Preparation as an iPad Administrator:…
Delivering innovative fully-managed cloud services for mission-critical applications requires expertise in multiple areas plus vision and commitment. Meet a few of the people behind the quality services of Concerto.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

929 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now