VMware ESXi 6.0 – How can I pass-through (add) my Mac Pro’s optical drive to a VM (running OS X Mountain Lion)?

Bit unconventional I know, but I am running VMware ESXi 6.0 on my old Mac Pro 1.1. If you don’t know what that is then (no offense, but) you won’t be able to help me. The Mac Pro host has a “super drive” as its optical drive for CDs & DVDs.

I am trying to use VM pass-through to get my physical optical drive passed-through to the virtual machine. However, I have added the device to the VM and enabled pass-through, but still do not see it in the VM. What could I be doing wrong here? Thanks.

enter image description here

How to create a folder alias inside of Google Drive

I like always to save files I receive by email into my shared folder in Google Drive. The problem is that my folder structure in Google Drive is pretty deep, so I have to click through many folders to finally arrive at the desired folder.

I would like simply to create an alias for the destination folder (that’s like ten levels deep) inside the root directory of my Google Drive folder. I tried creating an actual Mac alias but that alias didn’t show on the Google Drive folder structure (only my Mac).

Any ideas?

External bootcamp drive not seen on different MacBook Pro

When I purchased my MacBook Pro I setup bootcamp to run Windows 10 from and external SSD drive. I wrote up the details here: https://blog.brettski.com/2015/11/08/booting-a-macbook-pro-to-windows-using-an-external-ssd/ at the time.

What escapes me is why other MBP’s cannot boot from this drive. If I connect the SSD to an identical MBP, hold down Option and start, the external drive is not an option to boot from. It works fine from the computer it was created on.

Anyone know what may keep other computers from being able to use this drive as a boot drive?

encrypted drive cloning – cryptsetup resize error problem

I’m trying to clone my SDD to a larger device so I will have a bootable backup in anticipation of doing a system upgrade on several desktop clients. I also want to model a known-correct procedure to see if I can reliably clone my system drive to a larger HDD/SDD (so far all attempts to do this in the past have failed). Currently running 16.04 LTS which was built using the fully encrypted disk option. The test system being used is running fine.

I followed several procedures I found on this site but none worked. I hit a dead end with each procedure. So to simplify things, I did the following on a running system (not via LiveCD):

sudo dd if=/dev/sda of=/dev/sdd  bs=64k 

Opened GParted and deleted the old crypt-luks partition on /dev/sdd as instructed in the procedure posted here. This was a mistake and I was dead in the water from here on. I was unable to create a new crypt-luks partition.

So an answer that explains how to [re]create/resize the crypt-luks partition on the new target drive would be very helpful.

I repeated the dd and tried expanding the target crypt-luks partition (sdd5) with the following commands:

sudo cryptsetup luksOpen /dev/sdd5 sdd5_crypt sudo cryptsetup resize /dev/sdd5_crypt 

Which generated a Device /dev/sd5_crypt is not active error.

I think/hope that if I can get cryptsetup resize to work everything will be ok.

I’ve been at this for many hours doing research and trying to get this to work and I’m starting to get tunnel vision. I would VERY much appreciate someone posting a fix to get me working and ideally a complete, bullet-proof procedure that is known to work in cloning encrypted HDDs/SDDs.

I haven’t tested this but I’m assuming that the target dd drive will indeed boot without expanding any partitions. But of course being a lot larger than the source drive there is a lot of wasted/unallocated space. So this is really mostly a question about expanding encrypted file systems and no so much about cloning them.

Many thanks in advance.

Can you wipe a USB flash drive so securely that it’s impossible to recover deleted files through forensic analysis?

Internal SSD can be wiped with TRIM, but USB sticks are external SSD. They’re apparently difficult to wipe securely enough to make forensic analysis of the device impossible. This question has been asked before, about 4 or 5 years ago and the information is probably outdated. Looking for up-to-date advice on how to securely wipe files on a USB from a bootable media.

Is it possible to have a setup that can securely wipe USB with TRIM? Anyone know of any programs that will securely shred files on USB, making them impossible to recover via forensic recovery software?