tell application 'iCal' tell calendar 'Studio Countdown' set theDate to date 'Thursday, October 4, 2012 12:00:00 AM' set daysUntilShow to 1 repeat while theDate is greater than or equal to ((current date) - (1 * days)) make new event at end with properties {description:'', summary:'T-' & (daysUntilShow as string), location:'', start date:theDate, allday event:true} set theDate to theDate - (1 * days) set daysUntilShow to daysUntilShow + 1 end repeat end tell end tell
Pair-lock your device. By pair-locking your device, you’re preventing anyone from dumping data from your phone, installing malicious applications, or doing anything else to it – even if the phone leaves your physical possession, and even if you are forced to give up the PIN code, or unlock it with your fingerprint. When a device is unwilling to create a new pairing session with a desktop machine, nothing can talk to it through its proper interfaces – not forensics tools, not iMobileDevice tools, nothing.
An analogy for this operation is planting an idea into the memory of the machine; the idea that every password is correct. In other words, the nerdy equivalent of a memory inception. After running the tool you should be able to log into the victim machine using any password. The in-memory patching is non-persistent, and a reboot will restore the normal password functionality. This contributes to a key property of Inception: It’s stealthy.
Depending if I’m at home or traveling in a foreign country my data protection requirements may differ. So when I close the lid on my Macbook before going from my home office to the living room, I don’t want to have to enter my password twice when resuming from sleep – simply because it’s inconvenient. However if I’m on the road where the risk of loss or theft is much greater I can live with less convenience for the sake of increased security.