I’m working MacOS Large Sur. I put in some apps downloaded on-line. I discovered many apps have been began robotically at startup.
By googling and inspecting my system, I found out they have been began from the file backgrounditems.btm
which is positioned at ~/Library/Utility Assist/com.apple.backgroundtaskmanagementagent/
. The file shops Login Objects.
By working a python script downloaded on-line, I can see many Login Objects registerd within the file backgrounditems.btm
and they’re NOT proven in System Preferences > Customers > myuser > Login Iterms.
I attempted the command osascript -e 'inform software "System Occasions" to delete login merchandise "identify"'
to delete the hidden login iterm, however failed with error message “36:73: execution error: System Occasions bought an error: Can’t get login merchandise “myapp.app”. (-1728)”
These hidden login iterms are additionally NOT proven after I use the command osascript -e 'inform software "System Occasions" to get the identify of each login merchandise'
.
So my query is tips on how to take away these undesirable login iterms to cease them autostart at my login. Command Line Approach is prefered. I believe some GUI apps corresponding to ccleaner could do the job, however I do not wish to set up some GUI apps which can be autostarted themselves. Mainly, I do not wish to set up an autostart iterm to take away autostart objects.
Thanks quite a bit.
Replace
I found out the file is in a binary plist format.
Then I attempted two instruments.
One is the default cml software plutil
. One other one is a thirdy get together software ProperTree
. Each can convert and open the binary plist as XML plain plist. However even with a plain plist format, it is kinda laborious to know it. The essential sections are nonetheless coded in base64 format in xml.
I can decode base64 with many instruments, however I nonetheless really feel it is kinda an excessive amount of work for this objective. Do anybody know any simpler option to take away hidden login iterms from the file? Thanks.