yego.me
💡 Stop wasting time. Read Youtube instead of watch. Download Chrome Extension

Make A dmg File


2m read
·Nov 3, 2024

Hey guys, this is Mac Heads 101. This is going to be a video on how to create a disk image. You might know what a disk image is; it is a .dmg, and when you open it up, it mounts something to your desktop, which then can have files in it, etc. Most professional programs have this.

So first of all, you're gonna go into Spotlight and type Disk Utility, or open Disk Utility in some way. It's in /Macintosh HD/Applications/Utility/Disk Utility. Then you click New Image, and you select where. I'm going to set it as my desktop. You can save it as—I'll just call it My Disk Image. Then you can click Create.

Now this will be a secure disk image. Pretty great, right? Here it will create My Disk Image and mount it. I'm going to unmount this image. We can also open it up, so open up the disk image and drag files in. For instance, I'll add Terminal into that. So now I have a disk image that's going to have Terminal in it. It just copied Terminal to My Disk Image. I'll unmount it one more time.

Okay, so now if I open My Disk Image up, inside of it, it will have Terminal.app. So there you go, that's how to make a really cool disk image that's unencrypted. Now let's make another disk image that is password protected, or encrypted, as you might call it.

So you click New Image, and I'll call it My Disk Image one more time. Okay, and under Encryption, I'll select 256-bit AES encryption. That's the most secure type of encryption you can use for disk images right now. I'll just make my volume a little smaller.

So now I'll click Create, and it will create My Disk Image. It'll ask me for a password, so I'll set a password for My Disk Image. Let's create our disk image. So right here it is. Now, whenever someone gets My Disk Image on their computer, they'll have to type a password.

My Disk Image password is already stored in my keychain, but I'll remove it from my keychain and then continue the video. I'll show you what'll happen. Okay, so I deleted that password from my keychain. Now open it up, and it'll ask me for the password. Now I can type the secure password and then click OK and mount.

So this is how to securely encrypt a .dmg. This is great for when you're sending your friends secret files, stuff like that. So, um, yeah. Thank you for watching Mac Heads 101. Subscribe and goodbye.

More Articles

View All
How Does a Transistor Work?
In this phone, there are nearly 100 million transistors; in this computer, there’s over a billion. The transistor is in virtually every electronic device we use: TVs, radios, Tamagotchis. But how does it work? Well, the basic principle is actually incredi…
The fastest way to transform your entire life
So my last video was extremely depressing. I made a tutorial on how to ruin the rest of your life, and most of you thought it was an absolute banger, including myself. I thought it was really cool. I put a lot of effort into it, and I put a lot of effort …
How parameters change as data is shifted and scaled | AP Statistics | Khan Academy
So I have some data here in a spreadsheet. You could use Microsoft Excel or you could use Google spreadsheets, and we’re going to use the spreadsheet to quickly calculate some parameters. Let’s say this is the population. Let’s say this is—we’re looking a…
Carl Jung - How to Find Your Purpose
Your purpose is the reason you are here on Earth. It’s the thing that you were built for. So it’s an incredibly important thing to figure out because it’s the thing that guides you. Without a purpose, you’re lost. You have no North Star. Your life will fe…
Misconceptions About Falling Objects
Now I want you to make a prediction: in my left hand I have a standard size basketball, and in my right hand a 5 kg medicine ball. If I drop them both at exactly the same time, which one will hit the ground first? Ah, this is a trick one, isn’t it? The h…
Tracing function calls | Intro to CS - Python | Khan Academy
What exactly happens when the computer executes a function call? Well, let’s trace a program with a function definition to find out. When we run the program, the computer, as normal, reads the program line by line starting at the top of the file. When th…