QF-Test 5.0 and macOS Catalina (10.15)

In their recent version of macOS, named “Catalina” (10.15), Apple introduced a feature protecting users from executing malicious software downloaded from the Internet. To separate “good” from “bad” software, Apple implemented a so called “notarization” process, and software which has not been “notarized” cannot be executed on macOS Catalina without further ado.

Unfortunately, Apple tightened the criterias for notarization by February 2020 and excludes within others all software from notarization which build upon Java 8 – this also affects QF-Test in the latest version 5.0. Therefor, after downloading and moving QF-Test to the application folder, another step is required to execute QF-Test on those systems:

After starting QF-Test a message is shown that Apple cannot check QF-Test for malicious software:

macOS Catalina 10.15 Error Dialog

Close the dialog by clicking “OK”.

Then open the system preferences and there the section “Security & Privacy”:

macOS Catalina 10.15 Open System preferences

macOS Catalina 10.15 Select security privacy

In the tab “General” you can now find the remark that the start of QF-Test has been blocked.

macOS Catalina 10.15 Click open anyway

Confirm the execution of QF-Test by clicking “Open Anyway”. In the following dialog, you can finally allow the execution of QF-Test:

macOS Catalina 10.15 Allow Open Dialog

Now you can use QF-Test like usual, the operating system remembers the exception.

We use "Matomo" cookies to anonymously evaluate your visit to our website. For this we need your consent, which is valid for twelve months.

Cookie Configuration

Functional cookies

We use functional cookies to ensure the basic functionality of the website.

Performance and statistics cookies

We use Matomo for analyzing and optimizing our website. Cookies permit an anonymous collection of information that help us offering you a clear and user-friendly visit of our web pages.

Cookie details
Description Vendor Lifetime Type Purpose
_pk_id Matomo 13 Months HTTP Contains a unique, pseudonymized visitor ID internal to Matomo for recognizing returning visitors.
_pk_ref Matomo 6 Months HTTP Used to track from which website the anonymized user proceeded to our website.
_pk_ses Matomo 1 Day HTTP The Matomo session cookie is used to track the visitor's page requests during the session.
_pk_testcookie Matomo Session HTTP Used to check whether the visitor's browser supports cookies.
_pk_cvar Matomo 30 Minutes HTTP Temporarily store data about the visit.
_pk_hsr Matomo 30 Minutes HTTP Temporarily store data about the visit.