Fact-checked by Grok 2 weeks ago

Apple Disk Image

The Apple Disk Image, commonly identified by the file extension .dmg, is a proprietary disk image file format developed by . for macOS and other Apple operating systems. It encapsulates the full contents, file system structure, and metadata of a physical or virtual disk or folder, enabling it to be mounted directly in Finder as a read-write or read-only volume, similar to inserting a physical disk. Created and managed primarily through the built-in application on , Apple Disk Images support a range of internal formats, including APFS () for modern macOS volumes, HFS+ (Hierarchical File System Plus) for legacy compatibility, for cross-platform use with Windows, and for larger volumes exceeding 32 GB. They can be configured as sparse images that dynamically expand to accommodate added data, compressed variants for efficient storage and transfer (such as UDZO, a read-only zip-compressed format), or encrypted options to secure sensitive information using 128-bit or 256-bit encryption. These images play a central role in software distribution on Apple platforms, particularly for packaging applications outside the , where they can be digitally signed with a Developer ID to verify integrity and prevent tampering. Developers often customize .dmg files with visual elements like backgrounds, arranged icons, and symbolic links to the Applications folder to streamline user installation. Beyond distribution, they facilitate data backups (e.g., via with sparse bundle images), creation of bootable installers for macOS recovery, and production of physical media like CDs or DVDs by burning the image directly. To access contents, users simply the .dmg file, which mounts it on the or in a Finder sidebar for browsing and interaction, and it can be ejected when no longer needed.

Introduction

Definition and Purpose

An Apple Disk Image, commonly known by its primary file extension .dmg, is a file-based disk image format developed by Apple Inc. for use on macOS and other Apple platforms. It encapsulates the contents of a virtual disk, partition, or logical volume, allowing the image to be mounted directly in the macOS Finder as if it were a physical disk or optical media. This format emulates hardware storage devices, such as hard drives or DVDs, enabling seamless access to the contained files and folders without requiring additional hardware. The primary purposes of Apple Disk Images include , where they serve as containers for application installers and updates, facilitating easy download and installation over the . They are also widely used for data backups and archival, preserving entire filesystems or selected folders in a single, portable file that supports and for . Additionally, these images support the creation of bootable media, such as installers for macOS or volumes, allowing users to replicate and restore system environments efficiently. The format's MIME type is application/x-apple-diskimage, which identifies it for proper handling in browsers and file transfer protocols. Apple Disk Images were specifically developed to overcome limitations in earlier disk image formats, particularly in preserving the resource forks of Macintosh files during transfers across mixed networks or the , where such could otherwise be lost or corrupted. Resource forks, which store structured data like icons and application resources separate from the main data fork, were integral to compatibility, and the .dmg format embeds this information reliably within a unified structure.

Compatibility and File Systems

Apple Disk Images, commonly known as DMG files, exhibit native compatibility with macOS starting from version 10.0 (), where basic disk image mounting is supported through tools like Disk Copy. The Universal Disk Image Format (UDIF), the primary structure underlying most DMG files, was introduced in macOS 10.0 (). Advanced features such as sparse images and encryption were added in macOS 10.1 (), with zlib compression introduced in 10.2 (). On iOS and iPadOS, compatibility is limited to extraction via the Files app or third-party applications, without native mounting akin to macOS, as these platforms lack Disk Utility and full hdiutil equivalents. For non-Apple operating systems, partial support exists on Windows and Linux through third-party tools; for instance, 7-Zip or HFSExplorer on Windows allows extraction of contents, while dmg2img on Linux converts DMG files to mountable IMG formats. Regarding hardware compatibility, DMG files are fully supported on both Intel-based and Macs, as the format operates at the file system and tool level rather than being architecture-specific. extends to older PowerPC systems running macOS up to 10.5 (or 10.6 in PowerPC mode), where earlier disk image formats like NDIF and basic UDIF can be mounted, though modern UDIF images created on later systems may require flattening for recognition on these platforms. DMG files support a variety of file systems to ensure interoperability, including (HFS), (HFS+), (APFS, introduced in macOS 10.13 High Sierra), FAT, and for cross-platform use. Additionally, they accommodate optical media formats such as and (UDF) for hybrid CDs/DVDs, allowing raw disk images from other operating systems to be attached and read. APFS integration within DMG files, available since , enables advanced features like snapshots—read-only point-in-time copies of volumes—and at the container level, where multiple volumes share a single encrypted wrapper for efficient . This container-level approach in APFS-based DMGs supports formats such as APFS (Encrypted) or APFS (Case-sensitive, Encrypted), enhancing security without hardware-specific dependencies. As of macOS 26 Tahoe (released in 2025), Apple introduced the Apple Sparse Image Format (ASIF), a new format optimized for near-native speeds in encrypted volumes, complementing UDIF-based .dmg files.

Historical Development

Early Formats and Motivations

The development of early Apple disk image formats was primarily driven by the need to preserve the integrity of Macintosh files during transfer and storage, particularly due to the file system's dual-fork structure consisting of a data fork and a . The contained critical elements like icons, menus, and code resources, but common archiving tools such as or often fragmented or discarded it when transferring files over networks or the , leading to incomplete or non-functional applications. Disk images addressed this by bundling both forks into a single, mountable file that emulated a physical disk, enabling reliable distribution of software and of floppy disks for running older programs on newer . The earliest prominent format, Disk Copy 4.2 (often abbreviated as DC42), emerged in the late 1980s as part of Apple's Disk Copy utility, which was included starting with in 1988. This format targeted the replication of 400K and 800K single- and double-sided floppy disks, using extensions like .dc or .sit for compressed variants created with third-party tools such as StuffIt. It allowed users to create exact bit-for-bit copies of floppies for backup and distribution, solving the challenge of physically duplicating media in an era when floppy disks were the primary storage medium for software installation. However, Disk Copy 4.2 was inherently limited to floppy-sized images (typically 400 KB to 800 KB), lacked built-in or , and did not robustly support resource forks in a unified manner, making it prone to corruption during cross-platform transfers. To overcome these shortcomings, Apple introduced the New Disk Image Format (NDIF) around 1999 with the release of and Disk Copy 6.0. NDIF files, typically using .img or .smi extensions, were designed as self-mounting images that natively preserved resource forks, supported for smaller file sizes, and allowed for read-only variants suitable for . This format formalized the as a versatile tool for internet-based , addressing the growing demand for efficient Mac-specific archiving as online connectivity expanded. Despite these advances, NDIF suffered from limited cross-platform compatibility, as it relied on Macintosh-specific mounting mechanisms that failed on non-Apple systems, and it lacked integrated , leaving files vulnerable to tampering. These constraints highlighted the need for a more universal successor.

Introduction and Evolution of UDIF

The Universal Disk Image Format (UDIF), commonly associated with the .dmg file extension, was introduced by Apple in in 2001 as the successor to the New Disk Image Format (NDIF), addressing limitations in cross-platform compatibility and handling for disk images. UDIF standardized the .dmg extension for macOS-native disk images, enabling a single-file structure that encapsulates raw block data, partition maps, and metadata without relying on dual forks, which facilitated easier distribution over the and support for from the outset using Apple's proprietary method. This format quickly became central to software installation and archival tasks in macOS, allowing images to emulate physical disks or optical media while integrating seamlessly with the operating system's kernel extensions for mounting. A key milestone occurred in Mac OS X 10.2.3 in 2003, when Apple introduced compressed and Internet-Enabled .dmg files, incorporating XML-based plists for and to ensure during downloads. The Internet-Enabled feature, enabled via the hdiutil command, automates post-download and , prompting users to or copy contents while discarding the to save space, a capability that enhanced secure by validating against embedded XML data. Subsequent enhancements included compression support in Mac OS X 10.4 (2005), offering better ratios for larger images; LZFSE compression in OS X 10.11 (2015) for faster decompression on modern hardware; LZMA in macOS 10.15 Catalina (2019) for superior compression efficiency; and APFS container support in macOS 10.13 High Sierra (2017), allowing disk images to leverage the Apple File System's and features. UDIF's evolution reflects macOS's shift toward enhanced and , including a transition to big-endian metadata encoding in its trailer structures to maintain compatibility with PowerPC architectures during the Intel transition. Post-2012, integration with in OS X 10.8 Mountain Lion and later notarization requirements in macOS 10.14 Mojave enabled .dmg files to carry developer signatures and undergo automated Apple scans for , streamlining verified app distribution while blocking unsigned images. By 2025, UDIF saw no fundamental structural changes, though (14.x, 2023) and Ventura (13.x, 2022–2024) incorporated enhanced safety checks in the Disk Images framework to mitigate escapes and privilege escalations during mounting or verification. In June 2025, macOS Tahoe introduced the Apple Sparse Image Format (ASIF) as a new complementary format optimized for high-performance scenarios like virtual machines, achieving near-native speeds while coexisting with UDIF. These updates addressed vulnerabilities like in hdiutil, reinforcing UDIF's role in secure, containerized storage without altering its core block-based design.

File Format Specifications

Overall Structure

The Universal Disk Image Format (UDIF) functions as a for raw disk data blocks, enabling the representation of disks in a single-file format suitable for macOS. This core structure allows for optional encoding layers, such as CUDIFEncoding for and CEncryptedEncoding for , which wrap the underlying block data to enhance portability and protection without altering the logical disk layout. Key components of the UDIF include header and trailer sections that define the file's boundaries and attributes, the primary block data area consisting of UDIF blocks that mirror the physical disk sectors, and provisions for emulating forks through integrated structures. These elements ensure the image can be mounted as a while preserving compatibility with legacy Macintosh features. The block size is standardized at 512 bytes, aligning with traditional sector sizes for efficient mapping to devices. The format also accommodates sparse images, which allocate storage only for used blocks, thereby optimizing space for volumes with significant unused areas. Additionally, hybrid modes facilitate /DVD emulation by layering and UDF file systems over the UDIF container, allowing cross-platform for optical simulations.

Metadata and Resource Forks

Apple Disk Images in the Universal Disk Image Format (UDIF) incorporate metadata embedded as an XML property list at the end of the file, with its offset and length specified in the UDIF resource file structure via fields such as fUDIFXMLOffset and fUDIFXMLLength. This plist is accessed through the kUDIFResourceFileKey, which points to block index data under the blkx key, allowing for detailed file system information without external dependencies. The metadata's placement in the file trailer integrates it with the broader UDIF architecture, ensuring self-contained image integrity. A key role of this is the of resource forks for legacy (HFS) and HFS+ volumes, where non-fork data—such as resource streams traditionally stored separately—is preserved within the plist to prevent file splitting during transmission or archiving. This approach maintains compatibility with older Macintosh file structures while adapting to modern single-fork environments, avoiding the need for auxiliary files like those in the deprecated NDIF format. The XML plist contains essential elements including CRC32 checksums for data verification (via keys like DataChecksum and fUDIFDataForkChecksum), partition maps (such as or details), and volume headers that describe the image's block layout and parameters. Due to the absence of official Apple documentation, these components have been reverse-engineered through disassembly of private frameworks like DiskImages.framework and of sample images. The size of the plist is variable, typically ranging up to several kilobytes depending on the complexity of the image, and it has supported paths for international file names along with extended attributes since macOS 10.4 (). This evolution enhances the format's robustness for diverse file systems and global use cases.

Compression Methods

The compression layer in Apple Disk Images is applied through the CUDIFEncoding mechanism within the Universal Disk Image Format (UDIF), which enables efficient reduction of file sizes to facilitate distribution and storage. This encoding wraps the underlying data blocks, allowing for selective compression while preserving the overall disk image structure. Several algorithms are supported for compressing UDIF-based disk images, each introduced at different points in macOS evolution to balance compression ratios, speed, and compatibility. The early Apple Data Compression (ADC) algorithm, used in the UDCO format, was deprecated in favor of more standard options but provided asymmetric compression optimized for rapid decompression in read-only scenarios. Zlib, employing the DEFLATE method in the UDZO format, became the default since macOS 10.3 and remains widely used for its cross-platform compatibility and adjustable levels, typically set to level 6 for a balance of size and performance in disk images. Bzip2, via the UDBZ format introduced in macOS 10.4, offers higher compression ratios at the cost of slower processing and is now considered deprecated. Later enhancements include LZFSE in the ULFO format, added in macOS 10.11 for faster speeds suitable for modern hardware, and LZMA in the ULMO format, introduced in macOS 10.15 to achieve superior ratios for large files. LZFSE and LZMA are part of Apple's Compression framework, prioritizing efficiency on and architectures without tying to specific file systems. Implementation occurs on a per-block basis within the UDIF structure, where compressible blocks are encoded individually to minimize overhead, while sparse writable images (such as those in UDSB format) forgo to support dynamic resizing. Hybrid approaches may combine compressed and uncompressed segments for integrity verification during mounting. Compression ratios vary by content; for instance, text-heavy files often achieve approximately 2:1 reduction with zlib or LZMA, establishing key efficiency for .

Encryption Protocols

Apple Disk Images support two primary encryption standards: 128-bit , which is considered legacy and offers faster performance due to its smaller , and 256-bit , which provides enhanced against brute-force attacks and has been the recommended option in since macOS 10.7 . These ciphers operate in mode and can be applied via password-based authentication, where a user derives the encryption key, or certificate-based methods, which utilize an private key for decryption in advanced configurations. The encryption protocols evolved through two main versions to address security and compatibility needs. (v1), used in images prior to macOS 10.5 , employs trailer encryption, where the encryption header (identified by the 'cdsaencr' tag) is located at the end of the file, wrapping the data in a single passphrase-derived key without support for modern file systems like APFS. In contrast, version 2 (v2), introduced with macOS 10.5 and standard in subsequent releases, features header encryption with the 'encrcdsa' tag at the file's beginning, enabling compatibility with APFS volumes and accommodating multiple key types, including keybags for institutional recovery. At the core of these protocols is the CEncryptedEncoding layer, which encapsulates the compressed or raw data blocks (often in UDIF format) to provide confidentiality, wrapping them after any layer in the overall . Key derivation for v2 encryption relies on (Password-Based Key Derivation Function 2) with HMAC-SHA-1, using a and a high count—typically 250,000 rounds for 256-bit —to generate a key that unwraps the primary and HMAC keys, mitigating dictionary attacks. Initialization vectors for block encryption are derived via HMAC-SHA1 using the block number, though reverse-engineering efforts have highlighted ambiguities in blkx (block index) positioning relative to encrypted boundaries, potentially complicating forensic analysis. Encrypted disk images mounted in read-only mode exhibit faster mounting times compared to read-write configurations, as they avoid the overhead of on-the-fly re-encryption for modifications, making them suitable for or archival purposes. Additionally, v2 encryption integrates with FileVault's for system images, allowing derived keys from the full-disk encryption setup to unlock protected DMGs during or processes.

Features and Capabilities

Mounting and Verification

Apple Disk Images, commonly known as .dmg files, can be mounted on macOS systems through user-friendly graphical interfaces or command-line tools. In the Finder, users mount a disk image by double-clicking the .dmg file, which triggers the Disk Image Mounter to attach it as a virtual disk visible under /Volumes. This process presents the image's contents as a removable volume, complete with an eject option in the Finder sidebar for safe detachment. Alternatively, the hdiutil command-line utility facilitates mounting via the attach verb, such as hdiutil attach image.dmg, which similarly exposes the image as a mounted volume and supports options like specifying mount points or suppressing automatic filesystem mounting. Verification of Apple Disk Images ensures , particularly for files downloaded from the . Internet-enabled disk images, prepared using hdiutil internet-enable, automatically perform validation upon mounting post-download, typically employing or other supported algorithms like or CRC32 stored in the image's . If the verification fails due to or alteration, macOS quarantines the image and may display a warning prompt, preventing automatic mounting to protect system . Users can manually verify images using hdiutil verify image.dmg, which checks against embedded checksums without mounting. This process briefly references checksum details embedded in the image's for assessment. By default, mounted Apple Disk Images operate in read-only mode to preserve the original , appearing as non-writable volumes unless specified otherwise. For editing capabilities, users can mount in read-write mode using hdiutil attach -readwrite image.dmg or employ shadow files for non-destructive modifications on read-only images. Sparse image variants, such as UDSP (single-file sparse) or UDSB (sparse bundle), support dynamic sizing during write operations, allowing volumes to grow as needed up to predefined limits like 128 for UDSP. Additionally, disk images support multi-partition configurations, enabling multiple filesystems within a single .dmg, which mount as separate volumes. Hybrid formats facilitate optical media burning; for instance, HFS+/ISO images created via hdiutil makehybrid can be burned to or DVDs using hdiutil burn or , ensuring cross-platform readability. In modern OS, mounting relies on the DiskImages framework and associated extensions for low-level attachment, akin to mechanisms in user-space filesystem handling. In macOS 26 Tahoe (released September 15, 2025), Apple introduced the , a new sparse type that offers significantly faster write performance—up to 1,000% faster than traditional sparseimages—while maintaining dynamic allocation for efficient storage. ASIF images start small and expand as needed, similar to UDSP and UDSB, but with improved handling for large volumes and multiple partitions.

Security and Distribution Enhancements

Apple Disk Images (DMGs) incorporate and notarization as key security enhancements, introduced with macOS 10.14 Mojave, to verify the developer's identity and ensure the integrity of the image contents. uses digital certificates issued by Apple to authenticate the software developer, while notarization involves submitting the DMG to Apple for automated analysis to detect or vulnerabilities before distribution. These processes confirm that the DMG has not been tampered with since signing, providing users with assurance when installing applications. macOS further enforces these protections by blocking the execution of unsigned DMGs or those from unidentified developers, preventing potential from running without user intervention. In macOS 15.1 and later, has been strengthened by removing the right-click "Open" bypass option for unsigned applications, requiring users to employ commands (such as removing quarantine attributes) or disable to override these checks. This layered approach ensures that only verified DMGs can be mounted and their contents accessed seamlessly. For software distribution, DMGs are the preferred format for bundling macOS applications due to their support for tamper-evident checksums, which allow users to verify the image's integrity against published hashes before installation. This is particularly valuable for app bundles, as it detects any alterations during download or transit, reducing the risk of corrupted or malicious payloads. Additionally, sparse disk images enable efficient incremental updates by dynamically allocating space only for new or modified data, minimizing file sizes and bandwidth for software patches without requiring full image recreation. Modern macOS integrations extend these safeguards through quarantine attributes applied to downloaded DMGs, which flag files from the and prompt warnings upon mounting to mitigate risks from untrusted sources. In the macOS 15.7.2 security update (released November 3, 2025), Apple addressed vulnerabilities including code-signing downgrade issues and a sandbox escape in disk images, enhancing overall integrity checks for DMGs.

Associated Utilities

Native macOS Tools

serves as the primary for managing on macOS, enabling users to create, convert, format, encrypt, and burn these images directly from the application found in /Applications/Utilities/. To create a new blank , users select > New Image > Blank Image, where they can specify the image name, size, format—such as APFS for volumes on macOS 10.13 and later or Mac OS Extended (HFS+) for compatibility—and encryption options including 128-bit or 256-bit . Additional creation methods include imaging from a selected disk or device via > New Image > Image from [device name], which supports read-only, compressed, or raw formats, or from a using > New Image > Image from for read-only or hybrid images. For conversion, allows selecting Images > Convert to transform an existing image to formats like read-only (UDRO), read/write sparse bundle (UDSB), or DVD/CD master, with optional encryption applied during the process. Burning capabilities integrate with the Finder to produce optical media from master images, supporting APFS and HFS+ volumes for distribution. The hdiutil command-line tool provides a programmatic interface to the DiskImages framework for attaching, detaching, creating, verifying, and converting Apple Disk Images, offering greater flexibility for automation and scripting on macOS. For instance, creating a compressed and encrypted image from a source folder uses the command hdiutil create -srcfolder <source> -format UDZO -encryption AES-256 -o <output.dmg>, where UDZO specifies zlib compression and AES-256 provides strong encryption requiring a password. Attachment and detachment are handled via hdiutil attach <image.dmg> to mount the image and hdiutil detach <mountpoint> to unmount it, with options like -stdinpass for password input in scripts. Verification ensures image integrity using hdiutil verify <image.dmg>, while conversion employs hdiutil convert <input> -format <newformat> -o <output>, supporting formats such as UDRO for read-only or UDSB for sparse bundles. The tool supports scripting through the -plist option, which outputs results in property list format for integration into automation workflows, and features like hdiutil internet-enable <image> to optimize images for web downloads by enabling post-processing. Disk Copy, a legacy utility predating macOS 10.3 (), handled basic creation and management of disk images in earlier versions of Mac OS X and , but it was superseded by for more advanced features. Images produced with Disk Copy remain mountable on modern macOS systems via or hdiutil attach, preserving compatibility for archival purposes despite the tool's obsolescence.

Third-Party and Cross-Platform Tools

DropDMG is a third-party macOS application that provides advanced capabilities for creating and managing Apple Disk Images (.dmg files), including support for , , and segmentation to handle large files by splitting them into multiple parts for easier distribution. It also preserves file permissions, resource forks, and custom layouts such as background images and volume icons during the creation process. For cross-platform compatibility, dmg2img is a command-line tool written that converts compressed .dmg files to raw formats like ISO or , supporting decompression methods including , zlib, , and LZFSE. DMGExtractor, a Java-based graphical utility, enables extraction of contents from .dmg files on non-macOS systems, with specific handling for AES-128 encrypted images by prompting for passwords during the process. TransMac, a Windows-specific , allows reading and writing to HFS+, HFSX, and APFS volumes within .dmg files, facilitating file transfers between Windows and macOS environments without native support. In the open-source domain, The Sleuth Kit provides forensic analysis tools for examining uncompressed .dmg files by treating them as raw disk images containing HFS+ or APFS file systems, enabling recovery and inspection of file structures for investigative purposes. Additionally, darling-dmg is a Linux FUSE-based module that mounts .dmg files containing HFS+ file systems directly as virtual file systems, allowing users to access contents without conversion. Tools like offer partial support for .dmg files through built-in handling of HFS/HFS+ containers, but require third-party plugins for broader compatibility and lack full support for encrypted or advanced compression variants. This partial implementation often stems from reverse-engineering efforts, such as the VileFault project, which analyzed Apple's encryption in .dmg files to enable decryption in open-source contexts.

References

  1. [1]
    See the contents of a disk image on Mac - Apple Support
    Disk images have .dmg at the end of their names. To see the contents of a disk image, you must first open the disk image so it appears on the desktop ...Missing: documentation | Show results with:documentation
  2. [2]
    Disk Utility User Guide for Mac - Apple Support
    Create a disk image · Convert a disk image to another format · Resize a disk image · Restore a disk image to a disk. Set up and manage RAID disk sets. Overview ...Disk Utility User Guide · Repair a storage device · For macOS Tahoe
  3. [3]
    Create a disk image using Disk Utility on Mac - Apple Support
    Go to the Disk Utility app on your Mac. · Choose File > New Image > Blank Image. · Enter a filename for the disk image, add tags if necessary, then choose where ...
  4. [4]
    Packaging Mac software for distribution - Apple Developer
    Disk image ( .dmg ). You can sign a disk image, which protects all files and folders you include from modification after you sign it. The person receiving ...
  5. [5]
    Dmg - - Forensics Wiki
    DMG is the proprietary Apple Disk Image file recognized & primarily associated with the Macintosh OS X operating system used for emulating a hard disk or DVD.
  6. [6]
    Correct MIME type for .dmg files - Apple's lists
    Nov 25, 2002 · I'm looking for definitive documentation on the correct MIME type for a .dmg disk image file. The default Apache install on MacOS X has
  7. [7]
    A brief history of disk images on the Mac - The Eclectic Light Company
    Apr 5, 2025 · Mac OS 9 brought Disk Copy 6.0 with added support for the New Disk Image Format (NDIF), which supported resource forks, and ended with its last ...
  8. [8]
    hdiutil Man Page - macOS - SS64.com
    UDIF is the native image format for macOS. Raw disk images from other Operating Systems (e.g. .iso files) will be recognized as disk images and can be attached ...
  9. [9]
    Import and export photos and videos on iPad - Apple Support
    You can import photos and videos directly to the Photos app from a digital camera, an SD memory card, or another iPad or iPhone that has a camera.
  10. [10]
    How to mount a dmg file in Windows? - Super User
    Aug 10, 2011 · In Windows, most dmg images can be opened using several other programs such as Acute Systems TransMac, HFSExplorer, 7-Zip, UltraISO or IsoBuster.
  11. [11]
    Opening .dmg Files on a Linux System - Baeldung
    Jan 15, 2024 · dmg2img is a command-line tool in Linux to convert DMG files into the relatively more accessible IMG format. Hence, it enables access and ...
  12. [12]
    Whats the last OS X that supported Power PC? - Ask Different
    Sep 8, 2010 · Snow Leopard (OS X 10.6) is also the first Mac OS release since the introduction of System 7.1.2 that does not support the PowerPC architecture.Can we upgrade PowerPC Macs to OS X 10.7 now that 10.8 is out?Is there a way to install and use PowerPC applications on Intel Macs?More results from apple.stackexchange.com
  13. [13]
    File system formats available in Disk Utility on Mac - Apple Support
    In Disk Utility on your Mac, format disks or volumes using Apple File System (APFS), Mac OS Extended, MS-DOS (FAT), and ExFAT.
  14. [14]
    View APFS snapshots in Disk Utility on Mac - Apple Support
    An APFS snapshot is a read-only copy of its parent APFS volume, taken at a particular moment in time. An APFS volume can have zero or more associated APFS ...
  15. [15]
    [PDF] Apple File System Reference
    Jun 22, 2020 · Apple File System is the default file format used on Apple platforms. Apple File System is the successor to HFS.Missing: Image | Show results with:Image
  16. [16]
    A History of the DMG File Format | Aymeric on Software
    Apr 5, 2011 · One of the initial motivations for using disk images, during the Mac OS classic era, is that application files could not be reliably transmitted ...
  17. [17]
    Classic Mac OS Downloads and Updates
    Jul 23, 2013 · Need a copy of System 6.0.8, 7.0.1, or a newer version of the Classic Mac OS for your vintage Mac? You can dig through apple.com and try to find them.
  18. [18]
    Disk images - Apple Macintosh before System 7
    Jun 4, 1986 · Disk Copy 6.3.3 also handles NDIF "New Disk Image Format" disk images. With Mac OS 7.6, Apple dropped support for writing to the MFS format.
  19. [19]
    man page hdiutil section 1 - manpagez
    NDIF (New Disk Image Format) images were developed to replace the Disk Copy ... Additionally, compression and the ability to attach disk images to Mac OS 9 as ...
  20. [20]
    DeMystifyinG the DMG file format - NewOSXBook.com
    Jun 12, 2013 · As part of writing HFSleuth, a "bonus" tool for my book, I decided to implement DMG (disk image support). I realized, however, that the DMG file ...<|separator|>
  21. [21]
  22. [22]
    Mac OS X Programming Secrets - MacTech
    Mac OS 10.2.3 introduced the groovy concept of Internet-enabled disk images, which make the download experience even better. When users download an Internet- ...
  23. [23]
    Gatekeeper and runtime protection in macOS - Apple Support
    Dec 19, 2024 · Both the App Store review process and the notarization pipeline are designed to ensure that apps contain no known malware. Therefore by default, ...Missing: post- 2012
  24. [24]
    About the security content of macOS Sonoma 14.5 - Apple Support
    Disk Images. Available for: macOS Sonoma. Impact: An app may be able to elevate privileges. Description: The issue was addressed with improved checks.Missing: Ventura | Show results with:Ventura
  25. [25]
    About the security content of macOS Ventura 13.6.5 - Apple Support
    Disk Images. Available for: macOS Ventura. Impact: An app may be able to break out of its sandbox. Description: The issue was addressed with improved checks.Missing: Sonoma | Show results with:Sonoma
  26. [26]
    About the security content of macOS Ventura 13.7.7 - Apple Support
    Disk Images. Available for: macOS Ventura. Impact: Running an hdiutil command may unexpectedly execute arbitrary code. Description: This issue was addressed by ...
  27. [27]
    DMG.cpp in vbox/trunk/src/VBox/Storage – Oracle VirtualBox
    ### Summary of UDIF Version, Header/Trailer Location, Block Size, and Structure Info in DMG.cpp
  28. [28]
    DMG File Format
    This meta information is called koly or UDIF footer. Below is a structure which maps UDIF footer. typedef struct DMGUDIF { uint32_t u32Magic; /**< 0x000 - Magic ...
  29. [29]
    Archaeology | UDIF-format Disk Images - Mothers Ruin Software
    The UDIF Disk Image Trailer Format ... The DiskImages.framework is private, but through a combination of disassembly, references in the open-source Security.
  30. [30]
    Disk Images: Introduction - The Eclectic Light Company
    Oct 7, 2024 · Focussing on sparse bundles and UDIF read-write disk images, this explains their types, structure, how their size can change, ...
  31. [31]
    man page hdiutil section 1
    WHAT'S NEW. In Mac OS X 10.3, most Disk Copy functionality moved to Disk Utility and a new background application DiskImageMounter attaches images for the user.
  32. [32]
    Compression | Apple Developer Documentation
    ### Summary of Compression Algorithms Supported by Apple
  33. [33]
  34. [34]
    Securing Private Data On Your Mac Using An Encrypted Disk Image
    Nov 17, 2013 · You may choose either 128-bit AES encryption, or 256-bit AES encryption. ... Your volume will disappear, leaving the DMG image file intact.Missing: protocols | Show results with:protocols
  35. [35]
    nlitsme/encrypteddmg: Tool for analyzing and decrypting ... - GitHub
    A tool for decrypting Apple encrypted disk images. Both old 'v1' and current 'v2' images are supported. This tool can also decrypt iphone rootfilesystem ...
  36. [36]
    Decrypting an Encrypted .dmg - Nicola's Blog
    Aug 13, 2024 · A DMG file is a proprietary file format from Apple, used to distribute and install apps on MacOS, but it can also contain other things, such as a file system.
  37. [37]
    How secure is an Apple-encrypted image?
    Sep 29, 2016 · AES256-encrypted DMG uses 250,000 rounds of PBKDF2-HMAC-SHA-1 to generate the encryption key. So the "security level" is pretty good when it ...
  38. [38]
    Dismal write performance of Disk Images
    Jul 7, 2022 · The fastest type to write is the sparse bundle; without encryption, this achieved over 70% of the original SSD, and even with encryption it ...
  39. [39]
    What is FileVault Disk Encryption & How Does It Work on Mac? - Jamf
    Feb 26, 2025 · It is the encryption algorithm, based on the XTS-AES-128 cipher with a 256-bit key that helps “prevent unauthorized access to the ...
  40. [40]
    Distributing Your Application - Apple Developer
    Jun 11, 2012 · In the “Save as” text box, enter the name of the compressed file that you will distribute. ... For more information on hdiutil, see hdiutil .<|control11|><|separator|>
  41. [41]
    What does a .dmg verify? - Ask Different - Apple StackExchange
    Oct 1, 2018 · In most cases, your computer is just doing a checksum, to make sure the Apple Disk Image, .dmg , hasn't been corrupted due to a flakey network connection or ...How do I skip verification of a .dmg file? - Apple Stack ExchangeI have El Capitan and can not install a DMG file - Ask DifferentMore results from apple.stackexchange.com
  42. [42]
    Customizing the notarization workflow - Apple Developer
    You can verify the integrity of a disk image by running the hdiutil utility: % hdiutil verify <image>. Avoid heavily compressed disk images.<|separator|>
  43. [43]
    Restore a disk image to a disk using Disk Utility on Mac
    If the disk image has multiple partitions, you must restore each partition individually. Note: If your Mac has macOS 11 or later, restoring a disk image doesn't ...
  44. [44]
    Mac OS X Manual Page For setiopolicy_np(3) - Apple Developer
    For example, when an image file is mounted by DiskImages, DiskImages generate passive I/Os. DiskImages should mark these I/Os using the PASSIVE I/O policy ...
  45. [45]
    Notarizing macOS software before distribution - Apple Developer
    Give users even more confidence in your macOS software by submitting it to Apple for notarization.
  46. [46]
    Notarization for macOS 10.14.5+ - Free Pascal wiki
    Beginning with macOS 10.14.5 (Mojave), software signed with a new Apple developer certificate and all new or updated kernel extensions must be notarized to run.
  47. [47]
    Safely open apps on your Mac - Apple Support
    Oct 22, 2024 · macOS includes a technology called Gatekeeper, that's designed to ensure that only trusted software runs on your Mac.
  48. [48]
    How to run unsigned apps in macOS 15.1 - IT Notes
    Nov 4, 2024 · This is done through Apple's Gatekeeper process which blocks execution of known bad code or code with no signature at all. In versions of macOS ...
  49. [49]
    How to use checksums on Mac to verify app downloads - SecureMac
    Mar 15, 2022 · Step 1: Figure out which hashing algorithm to use · Step 2: Launch Terminal · Step 3: Enter the checksum command followed by a space · Step 4: Add ...
  50. [50]
    Create a disk image using Disk Utility on Mac - Apple Support
    Click the Image Format pop-up menu, then choose an option: Sparse Bundle Image (UDSB): A read/write image that grows with the data stored in it. The data is ...
  51. [51]
    What should I do about com.apple.quarantine? - Super User
    Aug 23, 2009 · This attribute is added so that it can ask for user confirmation the first time the downloaded program is run, to help stop malware.How to remove Quarantine from file permissions in OS XHow to disable quarantine completely in macOS?More results from superuser.com
  52. [52]
    Gatekeeper quarantine issue with certificate - macos - Stack Overflow
    Jun 13, 2016 · However, when the DMG is downloaded by the users, on some Macs the application is quarantined, but for the majority of users, it's not. So some ...Missing: enabled auto SHA-
  53. [53]
    Role of Apple File System
    Dec 19, 2024 · Apple File System (APFS) is a proprietary file system that was designed with encryption in mind. APFS works across all Apple's platforms.
  54. [54]
  55. [55]
    Cybercriminals Use EV Code Signing to Hide DMG Malware from ...
    Oct 1, 2025 · Malware operators continue to escalate their tactics by abusing Extended Validation (EV) code signing certificates to evade macOS security ...
  56. [56]
    Convert a disk image to another format using Disk Utility on Mac
    Convert a disk image to another format using Disk Utility on Mac. You can convert the image format and encryption of a disk image.Missing: LZFSE LZMA ULMO
  57. [57]
    Page Not Found - Apple Developer
    No readable text found in the HTML.<|control11|><|separator|>
  58. [58]
    DropDMG Feature List - C-Command Software
    DropDMG supports all the major formats, including compressed .dmg files, .sparsebundle files, .zip and .tar.gz archives, and hybrid disk images. Zlib disk ...
  59. [59]
    DropDMG Manual - C-Command Software
    DropDMG is the easiest way to create macOS disk images, as well as cross-platform archives. Just drag and drop a folder or file and you're done.
  60. [60]
    dmg2img - vu1tur - EU.org
    DMG2IMG is an Apple's compressed dmg to standard (hfsplus) image disk file convert tool. ... Added support for a rare case scenario of koly block being at ...
  61. [61]
    DMGExtractor - Catacombae
    DMGExtractor is a lightweight Java application for extracting the contents of a Mac OS X Disk Image file (extension .dmg) to raw binary format (such as an ISO ...
  62. [62]
    About TransMac for Windows
    TransMac software opens Mac APFS and HFS+ format disks and dmg files from Windows.
  63. [63]
    The Sleuth Kit
    The Sleuth Kit is a C library and collection of open source command line tools for the forensic analysis of NTFS, FAT, EXT2FS, and FFS file systems.Download · File Systems · Documents · History
  64. [64]
    darlinghq/darling-dmg: FUSE module for .dmg files ... - GitHub
    This project allows ordinary users to directly mount OS X disk images under Linux via FUSE. darling-dmg is part of Darling - http://www.darlinghq.orgMissing: tools | Show results with:tools
  65. [65]
    7-Zip / Discussion / Help: Can 7zip extract any DMG file ?
    Jul 8, 2021 · 7-Zip supports only HFS/HFS+ in DMG. If Apple will change DMG format, we can get situation that 7-Zip can't unpack such file.Missing: plugins limitations