How to install apps from unidentified developers on macOS High Sierra

The operating system of Mac computers has always been characterized by one of the operating systems that offer the least risk of being infected by viruses. But for some time to be a part, and because Macs have become a widely used tool in all areas, hackers are targeting macOS too.

Apple is aware of this and to try to prevent them from being easily infected, the year passed removed the option to be able to install apps from unidentified developers by Apple, so that we could not install any application that did not originate in the Mac App Store as within the Apple program.

Obviously, the community got down to work to get around that macOS Sierra limitation and obviously they succeeded, as we informed you a year ago. The new version of macOS, called High Sierra, offers us the same limitations, but fortunately we can skip it to install any application, regardless of its origin. When making these changes, it must be taken into account that if we do not know the source from which the application comes, we can put at risk not only the security of our Mac, but also the integrity of our data.

Install apps from unidentified developers on macOS High Sierra

  • First of all we must go to the terminal, since in order to add the Anywhere option, we cannot do it through the system options configuration.
  • Once we have opened Terminal, we write the following command: sudo spctl --master-disable
  • In front of master are two dashes (-) not one.
  • Then we restart the Finder with the command: Killall Finder and that's it.
  • We can now go to System Preferences> Security and Privacy and activate the Anywhere option in the Allow applications downloaded from:

 


The content of the article adheres to our principles of editorial ethics. To report an error click here!.

2 comments, leave yours

Leave a Comment

Your email address will not be published.

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.

  1.   Raúl Aviles said

    Well, thanks Nacho !!
    I was about to upgrade to HS and before I preferred to see "what problems" is giving ...

    Mac (21,5 inches, Late 2013) 2,7 GHz Intel Core i5. 8GB 1600MHz DDR3.

    Regards,

  2.   wd said

    Hello, I have a problem and it is that when I put the password it does not consider it valid, (and obviously I have not made any mistake writing the password)

bool (true)