SecurityBroadband Internet technology, with its rapidly increasing availability and affordability, has generated a need to secure personal computers in a way never conceived by its original inventors. Constantly connected PC’s are more prone to malicious attempts by the rising amount of computer hackers and “script kiddies”. To defend ourselves without busting our wallets, several software vendors have stepped up to the plate to offer software-based firewall solutions to protect the average PC user from most attacks prevalent today.
Computers on dedicated connections are more open to Internet-based attacks because they are …
August 4, 2001 •
6 min read
SecurityEttercap is a multipurpose sniffer/interceptor/logger for switched LAN. This program is fully unix based and was just ported to Mac OS X after a user requested it. If you are looking for your favorite unix based application to run on Mac OS X just give the programmers remote root so they don’t have to buy expensive hardware and they can do all the work from your box. 0.6.0 adds more support for Mac OS X!
Tools like this come in handy when programming, when you believe their is foul play happening, …
August 3, 2001 •
3 min read
SecurityWhat is Firewalk?
Firewalk is a Mac OS X configuration utility for the built in firewall. While you are running Mac OS X you should be aware that you are running on a BSD/Mach kernal. The built in firewall that Mac OS X offers is rather dirty, some like to get into the unix part of the operating system others still prefer the nice Macintosh GUI. This application makes it possible for you to configure the firewall properly with the graphical user interface that Macintosh users are used to.
Firewalk X 2 …
July 12, 2001 •
2 min read
SecurityInformation
Agax is an extensible free Mac anti-virus program. It offers both standard virus-scanning facilities and more advanced background protection – so you don’t get infected in the first place. Click on one of the links below to download Agax.
Views
Excellent free program. Protects against SevenDust, Autostart, and CODE9811. So this isn’t a full blown virus protection program yet; they are definitely adding the most current virus definitions!
Download Version
You can download Agax 1.3 from:
SecureMac – 1.3 version
Or try Downloading From:
Agax’s Website
Features
This is a snippet from the manual:
Agax is an anti-virus application. It …
July 11, 2001 •
9 min read
SecurityWhat is Secure FTP Wrapper
Secure FTP Wrapper is a Java based program designed to easily make your existing FTP server compatible with Glub Tech’s Secure FTP client. In this release the wrapper allows for a Secure Sockets Layer, or SSL, connection to be made to your FTP server.
This Wrapper is supported by Mac OS X, Windows, and Linux running the Java 2 runtime environment
Instead of using the standard FTP Protocal transfering data in plain text you are using a enhanced version which offers encryption. If someone is watching (sniffing) your …
July 11, 2001 •
1 min read
SecurityInformation
Password Key was designed to provide a limited amount of security to your Macintosh system with emphasis on “security without modification” in its processes. Even though it offers a fairly high level of security to the average “looker”, it does not in any way, affect either the hardware configuration, system software, or any of your files.
When used properly, Password Key should provide you with at least the knowledge of “illegal attempts” to enter your system, and at best, with a system that is left alone with its integrity kept complete.
Password …
July 9, 2001 •
3 min read
SecurityComputer equipment is stolen every second around the world. What makes you believe your computer is any bit safer than the next guys. The concept of Stealth Signal is simple. When you use the Stealth Signal service your computer is being kept tabs on, so the next time someone steals your laptop of desktop computer they will help you locate it, read how…
How Stealth Signal Operates:
A small undetectable program (Stealth Signal Transmitter) is installed in your computer. This program silently tries to send a signal to our Monitoring Network at …
July 6, 2001 •
4 min read
SecurityComputer equipment is stolen every second around the world. What makes you believe your computer is any bit safer than the next guys. The concept of Stealth Signal is simple. When you use the Stealth Signal service your computer is being kept tabs on, so the next time someone steals your laptop of desktop computer they will help you locate it, read how…
How Stealth Signal Operates
A small undetectable program (Stealth Signal Transmitter) is installed in your computer. This program silently tries to send a signal to our Monitoring Network at …
July 6, 2001 •
4 min read
Security
What is nidump?
nidump reads the specified NetInfo domain and dumps a por-
tion of its contents to standard output. When a flat-file
administration file format is specified, nidump provides
output using the syntax of the corresponding flat file.
The allowed values for format are aliases, bootparams,
bootptab, exports, fstab, group, hosts, networks, passwd,
printcap, protocols, rpc, and services.
If the -r option is used, the first argument is inter-
preted as a NetInfo directory path, and its contents are
dumped in a generic NetInfo format.
If the -r option is used, the first argument is inter-
preted as a NetInfo directory …
July 5, 2001 •
2 min read
SecurityInformation
Monitorer is a extension to record keystrokes as they are typed. Monitorer records everything you type with your keyboard and saves it. That can be very useful if you just wrote a very long text and your computer crashes. After restarting you will find the saved log-file in your preferences folder where you can copy your lost text! This application can also be used to check if any unauthorized person used your computer or you use it to view what your employees “produced” the whole day.
However Keystroke loggers were originally …
July 5, 2001 •
2 min read
SecurityWhat is SSH Helper?
Secure Shell Helper allows you to easily manage your OpenSSH keys and account access data files. Main features of this program is the easy ability to Add and Remove authorized keys. You can also Generate SSH1 RSA, SSH2 RSA and SSH2 DSA keys. Included in this distinct GUI application you may also View/Export Your Public Keys. This is just another fine example of a GUI application to configure command-line options, if you are a die hard Macintosh users then this interface is right for you. If you …
July 4, 2001 •
1 min read
SecurityIt is recommended that you revisit this page because there will be frequent updates and additions as new security related resources at Apple pop-up.
General Security
Mac OS Security and Cryptography (ADC)
Technical Q&As – Security (ADC)
Product Security Response Support Information
PGP: Protecting Security Information
Security Updates
Mailing Lists
Product Security Notifications and Announcements
Apple’s Implementation of the Common Data Security Architecture
Software
Mac OS (General)
Keychain Manager (ADC)
Mac OS: “Unable to establish a secure connection” or “security certificate” Messages in Web Browsers (TIL 106211) [2001 March 23]
Securely Erasing, Accessing and Dismounting a Macintosh Partition (ADC FL11) [1999 January 11]
Accessing the …
July 2, 2001 •
5 min read
SecurityMicrosoft Product for the Macintosh?
Ya I know It comes with os 8.x. If you have ever used a PC, or so they say, “Its Microsoft, its breaks, i tried to uninstall it, it broke” Well I tried to remove Microsoft Personal Web Server from my Macintosh and ran into a little problem i forgot to turn off 1 extension. WaMMo! My computer froze on startup. Probably the point where the extension realized all the other components were not there. I wonder if they plan on fixing it so it does …
June 6, 2001 •
2 min read
SecurityInterested in computer security and hacking? This book is written from the system administrators stand point. Hundreds of pages on security issues, how to secure your system, how the hackers get it. Out of those pages there is a nice chapter on our favorite operating system Macintosh . Find a place for this book on your bookshelf as it makes a great companion to anyone interested in computer security. Even if your not interested in security now, you might run into the need for this book soon. Plus read up …
June 6, 2001 •
2 min read
SecurityNetopia has released Timbuktu Preview for Mac OS X. There is a 29.95 charge for this software. Timbuktu is remote administration software which runs on Windows and Macintosh platforms. We received a E-Mail from Ed noting of a security hole with this product that lets a user @ the console have access without even having to log in to Mac OS X. The problem was reported to Netopia and because this is only a preview version we will look for a fix in the next release.
Scenario
At the login screen of …
June 4, 2001 •
2 min read
SecurityResources, Development and TILs on Security Issues
Here you will find reports and issues on software and the Mac OS. These are Apple.com and its’ discussion boards papers and documents. Use the feedback form below or send us a email with the title and the URL you would like us to add.
Mac OS X-Introduction to Security
A”…..As a web developer, information is your lifeblood, the tool and the substance of your trade. Keeping your information secure requires that your systems be protected from those looking to alter pages, steal data, or simply …
June 2, 2001 •
1 min read
SecurityInformation
PGPfone (Pretty Good Privacy Phone) is a software package that turns your desktop or notebook computer into a secure telephone. It uses speech compression and strong cryptography protocols to give you the ability to have a real-time secure telephone conversation via a modem-to-modem connection. It also works across the Internet!
Views
Suggest use with faster computers, this is for both PC and Mac so you can talk to whoever you want to. This does use your standard phone lines, so anyone with a computer and a modem could utilize it. Download Version:
You …
June 2, 2001 •
1 min read
SecurityInformation
AOL has been around for a long time. AIM is their version of ICQ; it has nice advertisements on it. You can keep in touch with other AOL users, and you don’t have to be on AOL. You don’t need to be a member of AOL to use AIM. It’s free; it just has an advertisement on it like AOL does.
Views
AOL’s AIM has had a few bugs, including easy decryption of password files. An application has been made to show how easy they are to decrypt. Scenario: A new version …
June 2, 2001 •
2 min read
SecurityInformation
Lockout is a excellent desktop security application with many valuable features. This program will keep intruders out of your computer system when you are away. Multiple user management in this program is excellent. This program also makes it possible where a user can leave a message on your computer if you are away.
Views
This program is new. Unlike AfterDark (aka the Ram Hog) this program will lock your screen where you are away. A handy utility to have at the office, home, or school if you dont want people to mess …
June 2, 2001 •
2 min read
SecurityInformation
Snip-it from Phil Zimmermann’s Why do you need PGP: ‘It’s personal. It’s private. And it’s no one’s business but yours. You may be planning a political campaign, discussing your taxes, or having an illicit affair. Or you may be doing something that you feel shouldn’t be illegal, but is. Whatever it is, you don’t want your private electronic mail (E-mail) or confidential documents read by anyone else. There’s nothing wrong with asserting your privacy. Privacy is as apple-pie as the Constitution. ‘
Views
PGP in my opinion is the best cryptography program …
June 2, 2001 •
1 min read