Search the Community
Showing results for tags 'Security'.
When I go to eject drives using Alfred (usually installer DMGs) I've been seeing this Volumes/firmwaresyncd.Ux5C91 as the first suggestion. This has persisted across many reboots. It's not going away. A screenshot is attached below. I don't see the supposed volume in Finder, GUI Disk Utility, nor via Terminal command "diskutil list". As far as I can tell the first hit with the curved return arrow is Alfred's best guess or perhaps a cached shortcut to a volume that no longer exists or something like that. When I did a search for the volume, I came across a similar question. It's not spel
Generate secure random passwords from Alfred. Uses /dev/urandom as source of entropy. Features Passwords can be generated based on strength or length. Offers multiple generators, including based on real words and pronounceable pseudo-words generated with Markov chains. Shows the strength of each generated password. Strictly offline — it's safer not to outsource your security to a webservice. Download & Installation Get the workflow from the GitHub releases page or Packal. Basic Usage pwgen [<strength>] — Generate passwords of the specified strength. Strength can be either
I'm a noob and loving Alfred 2. I've imported a bunch of workflows and am wondering if they pose any security risks. Can malware, viruses or keystroke loggers be added to my system by way of an imported workflow? Are workflows safe? Does running anti-virus on them before import do any good? What precautions does Alfred 2 take to make sure that no malevolent code gets added to my mac? Thanks for the app. It's really well done!