05-28-2017, 08:13 PM
There's several different strategies for attack:
Can you do Target Disk Mode? Log in. Drag em to the trash.
Can you log into a different user? Log in. Drag em to the trash.
Can you boot from a different drive? Drag em to the trash.
Is file sharing active or can it be set active? Log in. Drag em to the trash.
Can you use other apps with bearable speed? Use terminal to delete the file types.
Can you do Target Disk Mode? Log in. Drag em to the trash.
Can you log into a different user? Log in. Drag em to the trash.
Can you boot from a different drive? Drag em to the trash.
Is file sharing active or can it be set active? Log in. Drag em to the trash.
Can you use other apps with bearable speed? Use terminal to delete the file types.