Apple Os X Yosemite Update

broken image


For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the Apple Product Security website.

For information about the Apple Product Security PGP Key, see How to use the Apple Product Security PGP Key.

Locate and select OS X Yosemite, then click Free Upgrade. Type your Apple ID and Password to sign in. If you don't have an Apple ID, click Create Apple ID and follow the steps on the screen to create one. Once you've entered your Apple ID, your computer will begin downloading Yosemite.

  • Mac Pro (Early 2008 or newer) As for operating systems, you can update directly to Yosemite if you're running an OS on the list below: OS X Snow Leopard (v10.6.8).
  • Open System Preferences (you can click on the Apple logo in the menu to find it). Click on Software Update. Your computer will check for updates, and show that an update is available for your Mac.

Where possible, CVE IDs are used to reference the vulnerabilities for further information.

To learn about other Security Updates, see Apple Security Updates.

OS X Yosemite v10.10.3 and Security Update 2015-004

  • Admin Framework
    Available for: OS X Yosemite v10.10 to v10.10.2
    Impact: A process may gain admin privileges without properly authenticating
    Description: An issue existed when checking XPC entitlements. This issue was addressed with improved entitlement checking.
    CVE-ID
    CVE-2015-1130 : Emil Kvarnhammar at TrueSec
  • apache
    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.2
    Impact: Multiple vulnerabilities in Apache
    Description: Multiple vulnerabilities existed in Apache versions prior to 2.4.10 and 2.2.29, including one that may allow a remote attacker to execute arbitrary code. These issues were addressed by updating Apache to versions 2.4.10 and 2.2.29
    CVE-ID
    CVE-2013-5704
    CVE-2013-6438
    CVE-2014-0098
    CVE-2014-0117
    CVE-2014-0118
    CVE-2014-0226
    CVE-2014-0231
  • ATS
    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.2
    Impact: A local user may be able to execute arbitrary code with system privileges
    Description: Multiple input validation issues existed in fontd. These issues were addressed through improved input validation.
    CVE-ID
    CVE-2015-1131 : Ian Beer of Google Project Zero
    CVE-2015-1132 : Ian Beer of Google Project Zero
    CVE-2015-1133 : Ian Beer of Google Project Zero
    CVE-2015-1134 : Ian Beer of Google Project Zero
    CVE-2015-1135 : Ian Beer of Google Project Zero
  • Certificate Trust Policy
    Impact: Update to the certificate trust policy
    Description: The certificate trust policy was updated. View the complete list of certificates.
  • CFNetwork HTTPProtocol
    Available for: OS X Yosemite v10.10 to v10.10.2
    Impact: Cookies belonging to one origin may be sent to another origin
    Description: A cross-domain cookie issue existed in redirect handling. Cookies set in a redirect response could be passed on to a redirect target belonging to another origin. The issue was address through improved handling of redirects.
    CVE-ID
    CVE-2015-1089 : Niklas Keller (http://kelunik.com)
  • CFNetwork Session
    Available for: OS X Yosemite v10.10 to v10.10.2
    Impact: Authentication credentials may be sent to a server on another origin
    Description: A cross-domain HTTP request headers issue existed in redirect handling. HTTP request headers sent in a redirect response could be passed on to another origin. The issue was addressed through improved handling of redirects.
    CVE-ID
    CVE-2015-1091 : Diego Torres (http://dtorres.me)
  • CFURL
    Available for: OS X Yosemite v10.10 to v10.10.2
    Impact: Visiting a maliciously crafted website may lead to arbitrary code execution
    Description: An input validation issue existed within URL processing. This issue was addressed through improved URL validation.
    CVE-ID
    CVE-2015-1088 : Luigi Galli
  • CoreAnimation
    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.2
    Impact: Visiting a maliciously crafted website may lead to arbitrary code execution
    Description: A use-after-free issue existed in CoreAnimation. This issue was addressed through improved mutex management.
    CVE-ID
    CVE-2015-1136 : Apple
  • CUPS
    Available for: OS X Yosemite v10.10 to v10.10.2
    Impact: A local user may be able to execute arbitrary code with root privileges
    Description: A use after free issue existed in how CUPS handled IPP messages. This issue was addressed through improved reference counting.
    CVE-ID
    CVE-2015-1158 : Neel Mehta of Google
  • CUPS
    Available for: OS X Yosemite v10.10 to v10.10.2
    Impact: In certain configurations, a remote attacker may be able to submit arbitrary print jobs
    Description: A cross-site scripting issue existed in the CUPS web interface. This issue was addressed through improved output sanitization.
    CVE-ID
    CVE-2015-1159 : Neel Mehta of Google
  • FontParser
    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.2
    Impact: Processing a maliciously crafted font file may lead to arbitrary code execution
    Description: Multiple memory corruption issues existed in the processing of font files. These issues were addressed through improved bounds checking.
    CVE-ID
    CVE-2015-1093 : Marc Schoenefeld
  • Graphics Driver
    Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.2
    Impact: A local user may be able to execute arbitrary code with system privileges
    Description: A NULL pointer dereference existed in NVIDIA graphics driver's handling of certain IOService userclient types. This issue was addressed through additional context validation.
    CVE-ID
    CVE-2015-1137 : Frank Graziano and John Villamil of the Yahoo Pentest Team
  • Hypervisor
    Available for: OS X Yosemite v10.10 to v10.10.2
    Impact: A local application may be able to cause a denial of service
    Description: An input validation issue existed in the hypervisor framework. This issue was addressed through improved input validation.
    CVE-ID
    CVE-2015-1138 : Izik Eidus and Alex Fishman
  • ImageIO
    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.2
    Impact: Processing a maliciously crafted .sgi file may lead to arbitrary code execution
    Description: A memory corruption issue existed in the handling of .sgi files. This issue was addressed through improved bounds checking.
    CVE-ID
    CVE-2015-1139 : Apple
  • IOHIDFamily
    Available for: OS X Yosemite v10.10 to v10.10.2
    Impact: A malicious HID device may be able to cause arbitrary code execution
    Description: A memory corruption issue existed in an IOHIDFamily API. This issue was addressed through improved memory handling.
    CVE-ID
    CVE-2015-1095 : Andrew Church
  • IOHIDFamily
    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.2
    Impact: A local user may be able to execute arbitrary code with system privileges
    Description: A buffer overflow issue existed in IOHIDFamily. This issue was addressed through improved memory handling.
    CVE-ID
    CVE-2015-1140 : lokihardt@ASRT working with HP's Zero Day Initiative, Luca Todesco, Vitaliy Toropov working with HP's Zero Day Initiative (ZDI)
  • IOHIDFamily
    Available for: OS X Yosemite v10.10 to v10.10.2
    Impact: A local user may be able to determine kernel memory layout
    Description: An issue existed in IOHIDFamily that led to the disclosure of kernel memory content. This issue was addressed through improved bounds checking.
    CVE-ID
    CVE-2015-1096 : Ilja van Sprundel of IOActive
  • IOHIDFamily
    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5
    Impact: A malicious application may be able to execute arbitrary code with system privileges
    Description: A heap buffer overflow existed in IOHIDFamily's handling of key-mapping properties. This issue was addressed through improved bounds checking.
    CVE-ID
    CVE-2014-4404 : Ian Beer of Google Project Zero
  • IOHIDFamily
    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5
    Impact: A malicious application may be able to execute arbitrary code with system privileges
    Description: A null pointer dereference existed in IOHIDFamily's handling of key-mapping properties. This issue was addressed through improved validation of IOHIDFamily key-mapping properties.
    CVE-ID
    CVE-2014-4405 : Ian Beer of Google Project Zero
  • IOHIDFamily
    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5
    Impact: A user may be able to execute arbitrary code with system privileges
    Description: An out-of-bounds write issue exited in the IOHIDFamily driver. The issue was addressed through improved input validation.
    CVE-ID
    CVE-2014-4380 : cunzhang from Adlab of Venustech
  • Kernel
    Available for: OS X Yosemite v10.10 to v10.10.2
    Impact: A local user may be able to cause unexpected system shutdown
    Description: An issue existed in the handling of virtual memory operations within the kernel. The issue is fixed through improved handling of the mach_vm_read operation.
    CVE-ID
    CVE-2015-1141 : Ole Andre Vadla Ravnas of www.frida.re
  • Kernel
    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.2
    Impact: A local user may be able to cause a system denial of service
    Description: A race condition existed in the kernel's setreuid system call. This issue was addressed through improved state management.
    CVE-ID
    CVE-2015-1099 : Mark Mentovai of Google Inc.
  • Kernel
    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.2
    Impact: A local application may escalate privileges using a compromised service intended to run with reduced privileges
    Description: setreuid and setregid system calls failed to drop privileges permanently. This issue was addressed by correctly dropping privileges.
    CVE-ID
    CVE-2015-1117 : Mark Mentovai of Google Inc.
  • Kernel
    Available for: OS X Yosemite v10.10 to v10.10.2
    Impact: An attacker with a privileged network position may be able to redirect user traffic to arbitrary hosts
    Description: ICMP redirects were enabled by default on OS X. This issue was addressed by disabling ICMP redirects.
    CVE-ID
    CVE-2015-1103 : Zimperium Mobile Security Labs
  • Kernel
    Available for: OS X Yosemite v10.10 to v10.10.2
    Impact: An attacker with a privileged network position may be able to cause a denial of service
    Description: A state inconsistency existed in the processing of TCP headers. This issue was addressed through improved state handling.
    CVE-ID
    CVE-2015-1102 : Andrey Khudyakov and Maxim Zhuravlev of Kaspersky Lab
  • Kernel
    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.2
    Impact: A local user may be able to cause unexpected system termination or read kernel memory
    Description: A out of bounds memory access issue existed in the kernel. This issue was addressed through improved memory handling.
    CVE-ID
    CVE-2015-1100 : Maxime Villard of m00nbsd
  • Kernel
    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.2
    Impact: A remote attacker may be able to bypass network filters
    Description: The system would treat some IPv6 packets from remote network interfaces as local packets. The issue was addressed by rejecting these packets.
    CVE-ID
    CVE-2015-1104 : Stephen Roettger of the Google Security Team
  • Kernel
    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.2
    Impact: A local user may be able to execute arbitrary code with kernel privileges
    Description: A memory corruption issue existed in the kernel. This issue was addressed through improved memory handling.
    CVE-ID
    CVE-2015-1101 : lokihardt@ASRT working with HP's Zero Day Initiative
  • Kernel
    Available for: OS X Yosemite v10.10 to v10.10.2
    Impact: A remote attacker may be able to cause a denial of service
    Description: A state inconsistency issue existed in the handling of TCP out of band data. This issue was addressed through improved state management.
    CVE-ID
    CVE-2015-1105 : Kenton Varda of Sandstorm.io

  • LaunchServices
    Available for: OS X Yosemite v10.10 to v10.10.2
    Impact: A local user may be able to cause the Finder to crash
    Description: An input validation issue existed in LaunchServices's handling of application localization data. This issue was addressed through improved validation of localization data.
    CVE-ID
    CVE-2015-1142
  • LaunchServices
    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.2
    Impact: A local user may be able to execute arbitrary code with system privileges
    Description: A type confusion issue existed in LaunchServices's handling of localized strings. This issue was addressed through additional bounds checking.
    CVE-ID
    CVE-2015-1143 : Apple
  • libnetcore
    Available for: OS X Yosemite v10.10 to v10.10.2
    Impact: Processing a maliciously crafted configuration profile may lead to unexpected application termination
    Description: A memory corruption issue existed in the handling of configuration profiles. This issue was addressed through improved bounds checking.
    CVE-ID
    CVE-2015-1118 : Zhaofeng Chen, Hui Xue, Yulong Zhang, and Tao Wei of FireEye, Inc.
  • ntp
    Available for: OS X Yosemite v10.10 to v10.10.2
    Impact: A remote attacker may brute force ntpd authentication keys
    Description: The config_auth function in ntpd generated a weak key when an authentication key was not configured. This issue was addressed by improved key generation.
    CVE-ID
    CVE-2014-9298
  • OpenLDAP
    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.2
    Impact: A remote unauthenticated client may be able to cause a denial of service
    Description: Multiple input validation issues existed in OpenLDAP. These issues were addressed by improved input validation.
    CVE-ID
    CVE-2015-1545 : Ryan Tandy
    CVE-2015-1546 : Ryan Tandy
  • OpenSSL
    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.2
    Impact: Multiple vulnerabilities in OpenSSL
    Description: Multiple vulnerabilities existed in OpenSSL 0.9.8zc, including one that may allow an attacker to intercept connections to a server that supports export-grade ciphers. These issues were addressed by updating OpenSSL to version 0.9.8zd.
    CVE-ID
    CVE-2014-3569
    CVE-2014-3570
    CVE-2014-3571
    CVE-2014-3572
    CVE-2014-8275
    CVE-2015-0204
  • Open Directory Client
    Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.2
    Impact: A password might be sent unencrypted over the network when using Open Directory from OS X Server
    Description: If an Open Directory client was bound to an OS X Server but did not install the certificates of the OS X Server, and then a user on that client changed their password, the password change request was sent over the network without encryption. This issue was addressed by having the client require encryption for this case.
    CVE-ID
    CVE-2015-1147 : Apple
  • PHP
    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.2
    Impact: Multiple vulnerabilities in PHP
    Description: Multiple vulnerabilities existed in PHP versions prior to 5.3.29, 5.4.38, and 5.5.20, including one which may have led to arbitrary code execution. This update addresses the issues by updating PHP to versions 5.3.29, 5.4.38, and 5.5.20.
    CVE-ID
    CVE-2013-6712
    CVE-2014-0207
    CVE-2014-0237
    CVE-2014-0238
    CVE-2014-2497
    CVE-2014-3478
    CVE-2014-3479
    CVE-2014-3480
    CVE-2014-3487
    CVE-2014-3538
    CVE-2014-3587
    CVE-2014-3597
    CVE-2014-3668
    CVE-2014-3669
    CVE-2014-3670
    CVE-2014-3710
    CVE-2014-3981
    CVE-2014-4049
    CVE-2014-4670
    CVE-2014-4698
    CVE-2014-5120
  • QuickLook
    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.2
    Impact: Opening a maliciously crafted iWork file may lead to arbitrary code execution
    Description: A memory corruption issue existed in the handling of iWork files. This issue was addressed through improved memory handling.
    CVE-ID
    CVE-2015-1098 : Christopher Hickstein
  • SceneKit
    Available for: OS X Mountain Lion v10.8.5
    Impact: Viewing a maliciously crafted Collada file may lead to arbitrary code execution
    Description: A heap buffer overflow existed in SceneKit's handling of Collada files. Viewing a maliciously crafted Collada file may have led to arbitrary code execution. This issue was addressed through improved validation of accessor elements.
    CVE-ID
    CVE-2014-8830 : Jose Duart of Google Security Team
  • Screen Sharing
    Available for: OS X Yosemite v10.10 to v10.10.2
    Impact: A user's password may be logged to a local file
    Description: In some circumstances, Screen Sharing may log a user's password that is not readable by other users on the system. This issue was addressed by removing logging of credential.
    CVE-ID
    CVE-2015-1148 : Apple
  • Secure Transport
    Available for: OS X Yosemite v10.10 to v10.10.2
    Impact: Processing a maliciously crafted X.509 certificate may lead to unexpected application termination
    Description: A NULL pointer dereference issue existed in the handling of X.509 certificates. This issue was addressed through improved input validation.
    CVE-ID
    CVE-2015-1160 : Elisha Eshed, Roy Iarchy, and Yair Amit of Skycure Security Research
  • Security - Code Signing
    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.2
    Impact: Tampered applications may not be prevented from launching
    Description: Applications containing specially crafted bundles may have been able to launch without a completely valid signature. This issue was addressed by adding additional checks.
    CVE-ID
    CVE-2015-1145
    CVE-2015-1146
  • UniformTypeIdentifiers
    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 to v10.10.2
    Impact: A local user may be able to execute arbitrary code with system privileges
    Description: A buffer overflow existed in the way Uniform Type Identifiers were handled. This issue was addressed with improved bounds checking.
    CVE-ID
    CVE-2015-1144 : Apple
  • WebKit
    Available for: OS X Yosemite v10.10 to v10.10.2
    Impact: Visiting a maliciously crafted website may lead to arbitrary code execution
    Description: A memory corruption issue existed in WebKit. This issues was addressed through improved memory handling.
    CVE-ID
    CVE-2015-1069 : lokihardt@ASRT working with HP's Zero Day Initiative

Security Update 2015-004 (available for OS X Mountain Lion v10.8.5 and OS X Mavericks v10.9.5) also addresses an issue caused by the fix for CVE-2015-1067 in Security Update 2015-002. This issue prevented Remote Apple Events clients on any version from connecting to the Remote Apple Events server. In default configurations, Remote Apple Events is not enabled.

OS X Yosemite v10.10.3 includes the security content of Safari 8.0.5.

Dec 16, 2020 • Filed to: Solve Mac Problems • Proven solutions

Mac users get new software updates and versions more frequently than the other operating systems. That's both the blessing and curse for the Mac users. The latest software makes your Mac device compatible with the new technological developments. Still, it also makes the existing OS obsolete. That's why most Mac users with old devices try to update their Mac to OS X El Capitan. However, you can't update your Mac to El Capitan 10.11 if your Mac runs on software later than Mac OS X 10.6 Snow Leopard.

Is OS X El Capitan Still Available for Your Mac?

Apple os x yosemite update

OS X El Capitan (10.11) was launched on 25 September 2015, and it is an improved version of OS X Yosemite (10.10). Improved window management, quick and responsive interface, spotlight search, and enhanced graphics were the prerequisites of El Capitan OS. However, if you are planning to update your Mac to OS X El Capitan, your device must fulfill the following requirements.

Space Requirements

You can't install OS X El Capitan unless your Mac has a free space of 8.8 GB. However, that's the space you need to install El Capitan on your Mac. You might have to free more space to run your Mac more smoothly because low space slows down system performance.

Hardware Compatibility

Most of the Mac models can install and run OS X El Capitan, but in some devices, you can't use full features of this OS due to hardware limitations. For instance, you can't use AirDrop on your Mac if you don't have a WiFi network compatible with PAN. The followings are devices that are compatible with OS X El Capitan.

  • MacBook introduced in 2009 or later, plus MacBook (13-inch, Aluminum, Late 2008)
  • MacBook Air introduced in late 2008 or later
  • MacBook Pro introduced in mid-2007 or later
  • Mac mini introduced in early 2009 or later
  • iMac introduced in mid-2007 or later
  • Mac Pro introduced in early 2008 or later
  • Xserve models introduced in early 2009

RAM Compatibility

RAM is the temporary memory that supports the system to run apps and programs efficiently. Without enough RAM, trust me, you can't even run your native operating system smoothly. Similarly, you can't install El Capitan unless you have 2 GB RAM on your Mac.

Operating System Compatibility

Operating systems play a critical role in creating an operational environment for both the software and the hardware. If you have decided to update your Mac PC, you have to make sure that your device doesn't run the OS later than Mac OS X Snow Leopard 10. 6. 8.

Apple Os X Yosemite Update 10.10

People Also Search:

How to Update My Mac to OS X 10.11.6/10.11.4?

After you are done with checking the compatibility of your Mac device, it's time to follow some pre rituals to prepare your device for Mac OS X El Capitan 10.11. These steps are mandatory for the successful installation of El Capitan OS into your Mac, and Apple also suggests them.

Get Your Mac Ready for El Capitan Update

Unprepared installation of a new operating system can result in disappointment. Remember that you are going to get a relatively new OS for your older Mac. To increase the hardware compatibility of your Mac, you must go through a checklist for successful installation of OS X El Capitan.

Space in your Mac: This includes freeing space both on RAM and Disk drive. 2 GB RAM and 8.8 GB of disk space are mandatory because the installer would not proceed without the fulfillment of these hardware requirements.

Minimum battery requirement: During the OS update, a computer consumes battery quicker than the regular operations. Your Mac needs to have at least 45% battery to pass through the El Capitan installation.

Active Internet Connection: You can't proceed with any OS installation without an active internet connection. Along with the installation package, your Mac would also need some side installations throughout the update. Without the support of these plugins and drivers, you would be back to square one. So, an active connection is a must.

Update Apps: Outdated apps can halt the process of updating your Mac. As soon as the installation of Mac OS X El Capitan completes, you face a software crisis. Most of your apps would stop working, leaving you with a headache. That's why don't forget to update your apps before starting the update.

Backup Your Data: There's a high chance that you would lose your data during Mac OS X EI Capitan update because the new OS makes changes in every nook and corner of your PC. To prevent the possible data loss, make a double back up—one in the Time Machine and other in the external storage device. If there is any file missing after the El Capitan update, check how to recover files after OS X update.

Begin Update Process

Your device is ready to embrace Mac OS X El Capitan 10.11 after going through the steps mentioned earlier. Pocket camp apple. Now it's time for some real action.

Step 1Visit the official Mac App Store and search for Mac OS X El Capitan. Your search result would Stake you to the El Capitan page. You can also download El Capitan without the App Store by the following links.

Apple Os X Yosemite Update

OS X El Capitan (10.11) was launched on 25 September 2015, and it is an improved version of OS X Yosemite (10.10). Improved window management, quick and responsive interface, spotlight search, and enhanced graphics were the prerequisites of El Capitan OS. However, if you are planning to update your Mac to OS X El Capitan, your device must fulfill the following requirements.

Space Requirements

You can't install OS X El Capitan unless your Mac has a free space of 8.8 GB. However, that's the space you need to install El Capitan on your Mac. You might have to free more space to run your Mac more smoothly because low space slows down system performance.

Hardware Compatibility

Most of the Mac models can install and run OS X El Capitan, but in some devices, you can't use full features of this OS due to hardware limitations. For instance, you can't use AirDrop on your Mac if you don't have a WiFi network compatible with PAN. The followings are devices that are compatible with OS X El Capitan.

  • MacBook introduced in 2009 or later, plus MacBook (13-inch, Aluminum, Late 2008)
  • MacBook Air introduced in late 2008 or later
  • MacBook Pro introduced in mid-2007 or later
  • Mac mini introduced in early 2009 or later
  • iMac introduced in mid-2007 or later
  • Mac Pro introduced in early 2008 or later
  • Xserve models introduced in early 2009

RAM Compatibility

RAM is the temporary memory that supports the system to run apps and programs efficiently. Without enough RAM, trust me, you can't even run your native operating system smoothly. Similarly, you can't install El Capitan unless you have 2 GB RAM on your Mac.

Operating System Compatibility

Operating systems play a critical role in creating an operational environment for both the software and the hardware. If you have decided to update your Mac PC, you have to make sure that your device doesn't run the OS later than Mac OS X Snow Leopard 10. 6. 8.

Apple Os X Yosemite Update 10.10

People Also Search:

How to Update My Mac to OS X 10.11.6/10.11.4?

After you are done with checking the compatibility of your Mac device, it's time to follow some pre rituals to prepare your device for Mac OS X El Capitan 10.11. These steps are mandatory for the successful installation of El Capitan OS into your Mac, and Apple also suggests them.

Get Your Mac Ready for El Capitan Update

Unprepared installation of a new operating system can result in disappointment. Remember that you are going to get a relatively new OS for your older Mac. To increase the hardware compatibility of your Mac, you must go through a checklist for successful installation of OS X El Capitan.

Space in your Mac: This includes freeing space both on RAM and Disk drive. 2 GB RAM and 8.8 GB of disk space are mandatory because the installer would not proceed without the fulfillment of these hardware requirements.

Minimum battery requirement: During the OS update, a computer consumes battery quicker than the regular operations. Your Mac needs to have at least 45% battery to pass through the El Capitan installation.

Active Internet Connection: You can't proceed with any OS installation without an active internet connection. Along with the installation package, your Mac would also need some side installations throughout the update. Without the support of these plugins and drivers, you would be back to square one. So, an active connection is a must.

Update Apps: Outdated apps can halt the process of updating your Mac. As soon as the installation of Mac OS X El Capitan completes, you face a software crisis. Most of your apps would stop working, leaving you with a headache. That's why don't forget to update your apps before starting the update.

Backup Your Data: There's a high chance that you would lose your data during Mac OS X EI Capitan update because the new OS makes changes in every nook and corner of your PC. To prevent the possible data loss, make a double back up—one in the Time Machine and other in the external storage device. If there is any file missing after the El Capitan update, check how to recover files after OS X update.

Begin Update Process

Your device is ready to embrace Mac OS X El Capitan 10.11 after going through the steps mentioned earlier. Pocket camp apple. Now it's time for some real action.

Step 1Visit the official Mac App Store and search for Mac OS X El Capitan. Your search result would Stake you to the El Capitan page. You can also download El Capitan without the App Store by the following links.

Step 2From the official El Capitan page, you can download your required version.

Step 3Once the download is done, the El Capitan installer will pop up on your screen.

Step 4Press the 'Continue' button and wait for the installation to begin. You can proceed with the installation by following the instructions of the installer.

Step 5The installation process does not take a long time. Once the installation is done, you can restore your data from Time Machine or external drive.

Recover Lost Files After OS X El Capitan Update

Do you remember those pre-installation steps? Those steps were taken to minimize the chances of data loss during the Mac OS X El Capitan installation. Despite these precautions, you are still at the risk of unprecedented data loss. You can lose data due to the following reasons.

Data loss due to corrupted files: If your Mac contains corrupted files, you will lose your data. During installation, the new OS tries to fix or delete corrupted files. These overwritten or deleted files would not appear after installation.

Nature of Mac OS X El Capitan's update: You will replace your older OS with a new version that is not tailor-made for your Mac. That's a significant shift in the environment of your Mac. Such kinds of major updates come with uncertainty, and you can't predict whether you are going to lose your data or not.

Hardware specifications: 2 GB RAM and 8.8 GB disk space is a standard requirement for El Capitan's update. But it takes a lot more from a Mac device to adapt to a newly enforced environment. A slight incompatibility can make you lose your data without any notice.

Lost Your Data After Mac OS X El Capitan: What's Next?

Data loss is one of the anticipated drawbacks of the installation of Mac OS X El Capitan. If you have lost your data after while updating your Mac and don't know what's next, it's time to get expert help.

Recoverit Data Recovery can be used for getting your documents, audio clips, videos, and photos back after Mac OS update. It uses high-tech codecs that are compatible with more than a thousand formats of files. Here are all the good reasons to trust Recoverit Data Recovery.

  • Junk free installation for the data security of their users;
  • High compatibility with Mac on different versions;
  • Works effectively with every storage device: hard drive, USB drive, SD card, etc.;
  • Deep scanning feature;
  • Straightforward interface and quick data recovery.

Mac users can retrieve their lost data after OS X El Capitan Update by following these steps.

Step 1Download Recoverit and tap on its icon to launch it on your Mac
(If you can't find the Recoverit icon on your desktop, you can use Finder to search it.)

Step 2After running Recoverit successfully on your Mac, now choose the following options.

Step 3Select the location of the drive you want to recover files.

Step 4Use the 'Start' button to scan it. Scan retrieves all the data of your selected drive.

Step 5Using the option to 'Preview and Recover,' you can choose the files that you want to recover, and you are done.

Wrap Up

New updates always come with uncertainty for the old devices. However, you can reverse your loss of data by taking the precautionary steps. Despite these steps, you might lose a few of your files. But don't worry, an ace software like Recoverit can recover your data.

What's Wrong with Mac

Apple Os X Update Download

Recover Your Mac
Fix Your Mac
Delete Your Mac
Learn Mac Hacks




broken image