Oids Mac OS

  1. Oids Mac Os Catalina
  2. Ods Macros

Xavagus Prime Software
Shareware
$14.99
10.0.4
12/8/2003
7 MB
3,769
View the 4 Ratings/Reviews
Submit Your Review
Report Dead Link
Submit a File Change
Request Ownership
OIDS.X 10.0.4
OIDS.X is a fast-paced action/arcade style game, melding elements of games like Choplifter, Asteroids, Defender, Lode Runner, and Lunar Lander, to make one very fun and addicting Macintosh video game.
• Originally released in 1990, OIDS was a hit on the Macintosh with gamers looking for a fast paced arcade style game.
• OIDS earned a rating of five Mice in MacWorld magazine when it was released.
• New version optimized for Mac OS X, version 10.1.3 or higher, uses OpenGL for graphics.
• New CD-Quality sound effects.
• Completely redone graphics with more animation than ever before.
• New smoke trail effects on player ship and enemy ships.
• Resizable screen size can run up to 2048 pixels wide.
• New Title animation.
• New Aqua interface for choosing Galaxies to play or edit.
• Support for Keyboard and USB Game controllers.
• High frame rates for smooth animation.
• Easy high score posting to the OIDS High Scores web page.
• Registered version includes a level editor so you can create your own Galaxies.
• Comes with 11 levels ranging from easy to diabolical. Dozens more levels are available for free at the OIDS website.
OIDS.X is a shareware game and must be registered to enjoy all of its features. OIDS.X is a free upgrade to all registered OIDS 2.0.x users.
• Bug fixes
Mac OS X Only
Mac OS X 10.1.3 or later, G3 or higher, an OpenGL-capable video card (ATI Rage 128 or better), or any NVidia card.
OIDS.X


WhOfLuNgPoO?(12/2/2003 - version 10.0.3)
this game may look kinda lame, but give it a shot! its really hard! its pretty difficult too!
Dan Smith(9/6/2003 - version 10.0.1)
It took a while to get into but now I'm hooked! This is a really, really well done game. Some of the higher levels are insane!
Ezra(8/31/2003 - version 10.0.1)
It is the BEST GAME EVER!!!!!!!!!!!!!!!!! That is, of course, other than Oids 1.3
najdorf(8/19/2003 - version 10.0.1)
I like this ;-) Pretty cool game, if you're not a quaker and you look at gameplay more than graphics

View All Ratings & Reviews

Installing PostgreSQL on Mac. Follow the given steps to install PostgreSQL on your Mac machine. Make sure you are logged in as administrator before you proceed for the installation. Pick the latest version number of PostgreSQL for Mac OS available at EnterpriseDB. I downloaded postgresql-9.2.4-1-osx.dmg for my Mac OS running with OS X version. Photos on Mac features an immersive, dynamic look that showcases your best photos. Find the shots you’re looking for with powerful search options. Organize your collection into albums, or keep your photos organized automatically with smart albums. Perfect your photos and videos with intuitive built-in editing tools, or use your favorite photo.

With Domotz network monitoring software you can monitor Linux machines and MAC OS via SNMP.

It is sufficient to install an SNMP deamon on the Linux machine and make sure that the Domotz agent is using the same read-only community for that device.

In this articles you can find a list of instructions to learn how to enable SNMP for Linux and Mac OS.

Here is a list of instructions for installing SNMP deamons on most popular Linux distributions and on Mac OS:

For more information about configuring SNMP in Domotz see here.

At the end of this article, you will also find a practical use case for monitoring through Domotz the HW resources of your Linux machine, and a template to achieve that.

How to enable SNMP on Linux

Debian

1. Installation

2. Configuration

Edit the file: /etc/snmp/snmpd.conf with a text editor of your choice.

Add the following line:
rocommunity public

Note: The default Ubuntu “snmpd” configuration specifically denies almost everything useful with this configuration (limiting access to just enough information to tell that the machine is a Linux one):
view systemonly included .1.3.6.1.2.1.1
view systemonly included .1.3.6.1.2.1.25.1
rocommunity public default -V systemonly
This configuration locks the machine down, which may be “safe” if it will be on an insecure network with little SNMP administration knowledge available. However, if you are willing to monitor the performance of your machine with an external systems, comment them and replace the access with a secure mechanism (either with SNMP v3 or different community string).

Comment the line:
#agentAddress udp:127.0.0.1:161

Uncomment the line:
agentAddress udp:161,udp6:[::1]:161

Restart the snmpd service:

Ubuntu

1. Installation

2. Configuration

Edit the file: /etc/snmp/snmpd.conf with a text editor of your choice.

Add the following line:
rocommunity public

Note: The default Ubuntu “snmpd” configuration specifically denies almost everything useful with this configuration (limiting access to just enough information to tell that the machine is a Linux one):
view systemonly included .1.3.6.1.2.1.1
view systemonly included .1.3.6.1.2.1.25.1
rocommunity public default -V systemonly
This configuration locks the machine down, which may be “safe” if it will be on an insecure network with little SNMP administration knowledge available. However, if you are willing to monitor the performance of your machine with an external systems, comment them and replace the access with a secure mechanism (either with SNMP v3 or different community string).

Comment the line:
#agentAddress udp:127.0.0.1:161

Uncomment the line:
agentAddress udp:161,udp6:[::1]:161

Restart the snmpd service:

3. Allow SNMP ports in Firewall

Execute the following commands to allow necessary ports:

CentOS

1. Installation

2. Configuration

Edit the file: /etc/snmp/snmpd.conf

Add the following line:
rocommunity public

Replace the line below:
view systemview included .1.3.6.1.2.1.25.1.1
with the following line:
view systemview included .1.3.

Restart the snmpd service:

3. Allow SNMP ports in Firewall

Execute the following commands to allow necessary ports:

FreeBSD

1. Fetch Ports collection and install Installation

2. Configuration

Copy the following configuration file:
cp /usr/local/share/snmp/snmpd.conf.example /usr/local/etc/snmpd.conf

Add the following line:
rocommunity public

Comment the line:
#agentAddress udp:127.0.0.1:161

Uncomment the line:
agentAddress udp:161,udp6:[::1]:161

3. Allow SNMP ports in Firewall

Edit the /etc/rc.conf file and add the following lines:

snmpd_enable=”YES”
snmpd_conffile=”/usr/local/etc/snmpd.conf”

Uncomment the line:
agentAddress udp:161,udp6:[::1]:161

4. Start the Service

Edit the /etc/rc.conf file and add the following lines:

Red Hat Enterprise Linux (RHEL)

1. Installation

2. Configuration

Edit the file: /etc/snmp/snmpd.conf

Add the following lines:
rocommunity public
agentAddress udp:161,udp6:[::1]:161

Start the snmpd service:
systemctl enable snmpd && systemctl start snmpd

3. Allow SNMP ports in Firewall

Execute the following commands to allow necessary ports:

Edit the /etc/rc.conf file and add the following lines:

How to enable SNMP on Mac OS

1. Configuration

Oids Mac Os Catalina

Edit the file: /etc/snmp/snmpd.conf

Add the following line:
rocommunity public

2. Start the SNMP service

Execute the following commands to allow necessary ports:

Monitoring SNMP OiD through Domotz

Once the SNMP daemon has been configured on the Linux machine, and the Community Strings (for V1 and V2 – or Credentials for V3) are matching between the Linux machine and the Domotz Agent, Domotz will automatically browse and report all the possible MIBs available for that specific Linux machine.

In particular, you can search with Domotz for any possible specific OiD available on that specific Linux Machine.

Open the Domotz App or the WebApp. Identify your Linux Machine. Under the tab SNMP/TCP click on Add an SNMP Sensor. You will be proposed with the entire list of SNMP OiD available for that specific device, and the possibility to search among the descriptions (available in the MIB available for that device):

You can for instance search for all the possible OiD which contains the word “CPU” in their description, and then add the relevant ones.

By doing this, you can start monitoring the resource consumptions of your Linux machine.

Below in this article a few example of resource usage statistics extracted by Domotz out of a Linux machine using this mechanism.

CPU Usage

Through Domotz you can monitor either the spikes in the CPU usage as recorded by the CPU Load on 1 Min average:

Or the sustained CPU usage as recorded by the CPU Load on 15 Min average:

It is also possible to monitor the residual (idle) CPU available in the server:

Memory Usage

Through Domotz you can monitor the total available Memory on the Linux machine, or even more importantly the residual memory still free and available on the same:

OidsOids Mac OS

Volume or Storage occupancy

It is also possible to add the monitoring of any volume or storage and their occupancy via the default hrStorageTable:

For more information about configuring SNMP in Domotz see here.

Alerts on resource usage

Both in the case of the above examples, you can configure alerts so that you are notified if any unexpected load is affecting your server or Linux machine.

For example you can monitor if the CPU Idle at a certain point goes below a certain threshold, or if the residual memory is too low to have a safe environment.

In order to configure alerts, visit the Alert tab, then select the Custom type under the Personal Alerts, and Configure an SNMP Alert.

You will be be provided with the option to select the previously added SNMP OiD as input for the alert.

You can then either decide to receive the notification via Email or Push Notification, as Personal Alerts, or receive the notifications on your preferred channel, via the Shared Alert configuration:

  • through shared email addresses
  • Your ticketing system or PSA tool integrated with Domotz (e.g. Datto Autotask, ConnectWise Manage, Syncro MSP, Zendesk, Freshservice, etc)
  • Your company chat system (e.g. Microsoft Teams or Slack)
  • Any Web Server through Web Hooks (or possible third party integrations via Zapier or Node-Red)

Add Resource Usage monitoring via templateing

With Domotz it is possible to configure the monitoring and alerting via SNMP for a specific Linux machine (or generically for any server) and then use that configuration as a template for all the other servers that need to be monitored.

This can be achieved by the Export/Import Device Settings and Properties capability.

Once you have completed the configuration of the SNMP parameters you are willing to monitor for a Linux machine, and the alerts’ thresholds to get notified, click on the Export Device Settings and Properties.

A json file (like a template file) is generated and saved on your client with all the Domotz settings and properties for that specific device.

This same template json file can then be edited (e.g. to replace or remove some areas) and then used to apply the same SNMP settings (e.g. OiD to be monitored and their threshold) to all the other Linux machines that you are monitoring through Domotz.

This can be achieved from the Global Search and Manage functionality. Search for all the Linux machines you want to apply the template, select them with the multi-select check box, and then click on Import Device Settings and Properties:

Preconfigured Template for Linux Machine Resource usage Monitoring

The following file can be used as a baseline to build a template for monitoring resource usage of your Linux Machine:

In particular, once used for the Import Device Settings and Properties functionality, it will create 6 SNMP sensors (on CPU and Memory usage) and two triggers (alerts) on the usage of those resources:

Each device will then have the SNMP and TCP configured with the OiDs for monitoring CPU and Memory usage via SNMP:

Ods Macros

Was this article helpful?