yego.me
💡 Stop wasting time. Read Youtube instead of watch. Download Chrome Extension

Make A dmg File


2m read
·Nov 3, 2024

Hey guys, this is Mac Heads 101. This is going to be a video on how to create a disk image. You might know what a disk image is; it is a .dmg, and when you open it up, it mounts something to your desktop, which then can have files in it, etc. Most professional programs have this.

So first of all, you're gonna go into Spotlight and type Disk Utility, or open Disk Utility in some way. It's in /Macintosh HD/Applications/Utility/Disk Utility. Then you click New Image, and you select where. I'm going to set it as my desktop. You can save it as—I'll just call it My Disk Image. Then you can click Create.

Now this will be a secure disk image. Pretty great, right? Here it will create My Disk Image and mount it. I'm going to unmount this image. We can also open it up, so open up the disk image and drag files in. For instance, I'll add Terminal into that. So now I have a disk image that's going to have Terminal in it. It just copied Terminal to My Disk Image. I'll unmount it one more time.

Okay, so now if I open My Disk Image up, inside of it, it will have Terminal.app. So there you go, that's how to make a really cool disk image that's unencrypted. Now let's make another disk image that is password protected, or encrypted, as you might call it.

So you click New Image, and I'll call it My Disk Image one more time. Okay, and under Encryption, I'll select 256-bit AES encryption. That's the most secure type of encryption you can use for disk images right now. I'll just make my volume a little smaller.

So now I'll click Create, and it will create My Disk Image. It'll ask me for a password, so I'll set a password for My Disk Image. Let's create our disk image. So right here it is. Now, whenever someone gets My Disk Image on their computer, they'll have to type a password.

My Disk Image password is already stored in my keychain, but I'll remove it from my keychain and then continue the video. I'll show you what'll happen. Okay, so I deleted that password from my keychain. Now open it up, and it'll ask me for the password. Now I can type the secure password and then click OK and mount.

So this is how to securely encrypt a .dmg. This is great for when you're sending your friends secret files, stuff like that. So, um, yeah. Thank you for watching Mac Heads 101. Subscribe and goodbye.

More Articles

View All
2015 AP Chemistry free response 3b | Chemistry | Khan Academy
A total of 29.95 milliliters of 1.25 molar hydrochloric acid is required to reach the equivalence point. Calculate the concentration of potassium sorbate when you put the brackets; they’re talking about concentration in the stock solution. So, let’s just…
The Cleverest Productivity Hack | Productivity Hacks for Students
This is a good idea. So, I used to buy this gum from the grocery store, and it was just like regular Wrigley’s Extra or whatever. But it was my study gum, so I only studied it when I chewed it, and I only chewed it when I was about to study. It was like m…
The First Monotheistic Pharaoh | The Story of God
Amid the remains of dozens of pharaohs, Egyptologist Salma Ikram is going to help me find one whose name is Akhenaten. There he is! Yep, he thought that there were too many gods and not enough focus on him. There will need to be an important god whom onl…
Changes in POV and dramatic irony | Reading | Khan Academy
Hello readers! Today I’d like to talk about differences in point of view in literature. When we analyze the perspectives of storytellers, whether that’s a point of view character, an omniscient narrator, or a narrator that attaches closely to multiple per…
What’s Your Personality Type? | An Introduction to the Enneagram
The Enneagram of Personality is a system used by numerous mental health professionals to get more insight into one’s character, and as a method for self-development. The Enneagram consists of nine personality archetypes that are interconnected in differen…
Vector form of the multivariable chain rule
So, in the last couple of videos, I talked about the multi-variable chain rule, which I have written up here. If you haven’t seen those, go take a look. Here, I want to write it out in vector notation, and this helps us generalize it a little bit when the…