yego.me
💡 Stop wasting time. Read Youtube instead of watch. Download Chrome Extension

Make A dmg File


2m read
·Nov 3, 2024

Hey guys, this is Mac Heads 101. This is going to be a video on how to create a disk image. You might know what a disk image is; it is a .dmg, and when you open it up, it mounts something to your desktop, which then can have files in it, etc. Most professional programs have this.

So first of all, you're gonna go into Spotlight and type Disk Utility, or open Disk Utility in some way. It's in /Macintosh HD/Applications/Utility/Disk Utility. Then you click New Image, and you select where. I'm going to set it as my desktop. You can save it as—I'll just call it My Disk Image. Then you can click Create.

Now this will be a secure disk image. Pretty great, right? Here it will create My Disk Image and mount it. I'm going to unmount this image. We can also open it up, so open up the disk image and drag files in. For instance, I'll add Terminal into that. So now I have a disk image that's going to have Terminal in it. It just copied Terminal to My Disk Image. I'll unmount it one more time.

Okay, so now if I open My Disk Image up, inside of it, it will have Terminal.app. So there you go, that's how to make a really cool disk image that's unencrypted. Now let's make another disk image that is password protected, or encrypted, as you might call it.

So you click New Image, and I'll call it My Disk Image one more time. Okay, and under Encryption, I'll select 256-bit AES encryption. That's the most secure type of encryption you can use for disk images right now. I'll just make my volume a little smaller.

So now I'll click Create, and it will create My Disk Image. It'll ask me for a password, so I'll set a password for My Disk Image. Let's create our disk image. So right here it is. Now, whenever someone gets My Disk Image on their computer, they'll have to type a password.

My Disk Image password is already stored in my keychain, but I'll remove it from my keychain and then continue the video. I'll show you what'll happen. Okay, so I deleted that password from my keychain. Now open it up, and it'll ask me for the password. Now I can type the secure password and then click OK and mount.

So this is how to securely encrypt a .dmg. This is great for when you're sending your friends secret files, stuff like that. So, um, yeah. Thank you for watching Mac Heads 101. Subscribe and goodbye.

More Articles

View All
15 Investments Rich People Make The Poor Know Nothing About
Rich people are making bank in ways everyone else isn’t even aware of. If you watch Until the End, you’ll realistically learn more about money in this video than you did in an MBA course. Here are 15 investments rich people make the poor know nothing abou…
The Deadliest Virus on Earth
In the 1970s, thousands of Chickenheads rained from the sky in Europe, making foxes and other wildlife confused and very happy. Why? They were filled with a vaccine to fight the deadliest virus known to humanity. Since the 1930s, a rabies epidemic had bee…
Limits of composite functions: external limit doesn't exist | AP Calculus | Khan Academy
So, over here I have two functions that have been visually or graphically defined. On the left here, I have the graph of g of x, and on the right here, I have the graph of h of x. What I want to do is figure out what is the limit of g of h of x as x appro…
AMC TO $100,000 | What You MUST Know
What’s at Melbourne Capital? It’s Wall Street bets here. And before we start the video, we gotta grab some popcorn because before we go to the Moon, we gotta make a quick pit stop at the movie theater and talk about the insanity that is AMC. That’s right…
Slavery in the British colonies | Period 2: 1607-1754 | AP US History | Khan Academy
This is a chart showing estimated population around the year 1750 in the British colonies in the New World. I’ve arranged this more or less from north to south, and you can see that as you go farther south, the percentage of the population that was enslav…
The Shark Immune System | When Sharks Attack
[music playing] NARRATOR: As experts begin to search for other explanations, they turn their attention to a series of disturbing discoveries that occurred in the months following the June 2012 attacks. We had some dolphins that washed up already dead. We…