SecurityInformation
No Longer for the Macintosh, No download, No Purchase.
Aladdin is the creator of the compression program ‘Stuffit Expander’. They have worked hard on all of their projects to ensure quality. Their programs are used by most of the macintosh community, and have been shown the respect they deserve. They have now released the program Private File. Just drag-and-drop to protect your sensitive files – simple, fast and easy. Whether you choose to drag and drop your files onto the desktop drop boxes, or select the files and then click on …
June 2, 2001 •
5 min read
SecurityInformation
PowerCrypt implements the major cryptographic methods, standards and hash algorithms: DES, IDEA, RSA, DSA, PKCS, MD2, MD5. As well, PowerCrypt implements the major secure e-mail protocols: PEM, S/MIME.
PowerCrypt handles standard X 400 certificates:
It stores received new certificates both as a local password protected copy and a public copy in a central Certificate Directory accessible to other users.
It creates new keys and prototype certificates for certificate requests
You can use it to implement a Certification Authority of your own, to certify your own certificates for your work group or friends. i.e. PGP …
June 2, 2001 •
1 min read
SecurityInformation
Privacy means that only the intended recipient of a message can read it. By providing the ability to encrypt messages, PGP provides protection against anyone eavesdropping on the network. Even if the information is intercepted, it is completely unreadable to the snooper. Authentication identifies the origin of the information, certainty that it is authentic, and that it has not been altered. Authentication also provides an extremely valuable tool in network security: verification of the identity of an individual. In addition to secure messaging, PGP also provides secure data storage, enabling …
June 2, 2001 •
4 min read
SecurityInformation
PGP Personal Security – 7.0.3 for Macintosh w/RSA – $19.95 USD – Strong, secure, protection for your hard disk, data, and email.. Available in: US or Canada only
Views
Excellent program, for those who remember 6.0.2 was free for a limited time. The current price of the product is 19.95 and you can purchase from mcafee online
Download Version
Download PGP Personal Security – 7.0.3
Features
Information privacy for individuals and businesses.
Secure e-mail and attachments with a single click.
Encrypt data on your hard drive automatically and transparently.
Create self-decrypting files and folders.
Securely “shred” files so they can …
June 2, 2001 •
1 min read
SecurityWhat is SSH Admin?
Secure Shell Admin allows you to easily configure and use the Secure Shell Daemon.
With Secure Shell Admin you have are setup easily with the 3 Step setup wizard. From there you may configure the server options and access lists. You can view the server messages in the log console and control the server easily ( Start/Stop/Restart )

June 2, 2001 •
1 min read
SecurityInformation
Snort is a lightweight network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Snort uses a flexible rules language to describe traffic that it should collect or pass, as well as a detection engine that utilizes a modular plugin architecture. Snort has a real-time alerting capability as …
June 2, 2001 •
3 min read
SecurityInformation
ContentBarrier offers content control, web filters, parental control and much more. ContentBarrier is made by Intego, the creators of the MacOS firewall NetBarrier. This software is primarily used for two targeted audiences, the parent who want to restrict young children from accessing the uncensored web; And the work place to protect the employer from liability, increase bandwidth and productivity.
Parental Control
If you don’t already know, the web can be a dangerous place because of the freely available content. ContentBarrier has predefined filters that let you choose what you don’t want your …
June 2, 2001 •
4 min read
SecurityInformation
IPNetSentry is a simple and intelligent security application which protects your Macintosh from outside Internet intruders. This is particularly important for Macintosh users who have cable modem, DSL, or another high-speed Internet service where connections can be maintained and left unattended for hours (or days) at a time.
Unlike most other Internet security products, IPNetSentry does not erect barriers for the safe use of your Internet connection. There is no need to “punch holes” in a firewall for specific applications you may wish to run. Instead, IPNetSentry silently and intelligently watches …
June 2, 2001 •
3 min read
SecurityWhat is OpenSSH
OpenSSH is a cost free version of the SSH protocol suite. Many of the users who utilize telnet, ftp, rlogin and other programs may not realize that their passwords are transmitted in plain text (unencrypted) across the Internet. The OpenSSH suite encrypts all data that comes to and from your computer including passwords.
The OpenSSH suite includes many functions and programs. SSH replaces rlogin and telnet, sftp replaces the plain ftp program and rcp is replaced with a enhanced scp program.
Luckily enough Apples new operating system, Mac OS X …
June 2, 2001 •
2 min read
SecurityInformation
DoorStop, from Open Door Networks, Inc., is a software-based “firewall” product for Macintosh servers. DoorStop is software that you install directly on the servers which you wish to protect. DoorStop is significantly easier to set up and use than a hardware firewall and provides the same capabilities at lower cost.
With DoorStop, you can specify precisely which machines should have access to which services, and you can keep track of both allowed and denied access attempts to those services. DoorStop works well with a wide range of Macintosh-based Internet servers, including …
June 2, 2001 •
2 min read
SecuritySecurity Bulletin Issued by Microsoft May 21, 2001
The following is the list of vulnerable products:
Microsoft Word 98 for the Mac
Microsoft Word 2001 for the Mac
Summary
When Microsoft Word opens a RTF (Rich Text Format) file that contains a link to a template, only the RTF file is checked for macros. When a a macro is embedded into the template file that was opened from a link in the RTF file an attacker could set the macro to run automatically and execute commands without your authorization – you even knowing …
May 21, 2001 •
2 min read
SecurityInformation
SuperLock is the premier shareware Macintosh security utility. It has been protecting Macs from casual snoopers since 1993, and it protected Macs for two years before that as a program called MacLauncher (which still works properly on the latest Macs!). It can be found on Macs all over the world belonging to students, teachers, governments, and normal, everyday people.
SuperLock 4.0.2 Lite is a slimmed-down version of SuperLock 4.0 Pro. Whereas SuperLock Pro is intended for settings like school labs where multiple people access one machine, SuperLock Lite is for Macs …
May 2, 2001 •
2 min read
Securitypublished: September 09, 2000
vulnerable: Intego’s NetBarrier (all versions) running on MaCOS
Discussion
Intego software (www.intego.com) offers a security software package for the Macintosh platform. The software is a firewall utility that allows the user to chose between different security schemes (server only, client only, customized, etc) and block different kind of known DoS (pingflood, synflood, ping of death, etc). One way of actually protecting the user from a remote attack such as a pingflood is to allow the user to block the ip from where the attack is performed. The software either …
September 9, 2000 •
4 min read
Securityalso known as OSX/LoserGame.A
-
-
- Last updated:
- 02/09/16 9:14 pm
-
Description
LoseLose is malware that acts like a game and deletes files on your computer as you play it.
LoseLose Threat Removal
MacScan can detect and remove LoseLose Malware from your system, as well as provide protection against other security and privacy threats. A 30-day trial is available to scan your system for this threat.
Download MacScan
•
1 min read
Security
-
-
- Last updated:
- 02/09/16 9:14 pm
-
Description
TypeRecorderX is a keylogger.
TypeRecorderX Threat Removal
MacScan can detect and remove TypeRecorderX Keylogger from your system, as well as provide protection against other security and privacy threats. A 30-day trial is available to scan your system for this threat.
Download MacScan
•
1 min read
Security
-
-
- Last updated:
- 02/09/16 9:14 pm
-
Description
WireLurker is a trojan horse that was originally distributed with pirated software.
WireLurker Threat Removal
MacScan can detect and remove WireLurker Trojan Horse from your system, as well as provide protection against other security and privacy threats. A 30-day trial is available to scan your system for this threat.
Download MacScan
•
1 min read
Securityalso known as OSX/KeystrokeWatch.A
-
-
- Last updated:
- 02/09/16 9:14 pm
-
Description
KeystrokesWatch is a keylogger.
KeystrokesWatch Threat Removal
MacScan can detect and remove KeystrokesWatch Keylogger from your system, as well as provide protection against other security and privacy threats. A 30-day trial is available to scan your system for this threat.
Download MacScan
•
1 min read
Securityalso known as HackBack, OSX/KitM.A, OSX/KitM.B
-
-
- Last updated:
- 02/09/16 9:14 pm
-
Description
FileSteal is a trojan horse that targets specific activist groups.
FileSteal Threat Removal
MacScan can detect and remove FileSteal Trojan Horse from your system, as well as provide protection against other security and privacy threats. A 30-day trial is available to scan your system for this threat.
Download MacScan
•
1 min read
Security
-
-
- Last updated:
- 02/09/16 9:14 pm
-
Description
Minesteal is a trojan horse that steals Minecraft passwords.
Minesteal Threat Removal
MacScan can detect and remove Minesteal Trojan Horse from your system, as well as provide protection against other security and privacy threats. A 30-day trial is available to scan your system for this threat.
Download MacScan
•
1 min read
Securityalso known as OSX/MacLog.B, OSX/MacLog.C
-
-
- Last updated:
- 02/09/16 9:14 pm
-
Description
DRPULogger is a keylogger.
DRPULogger Threat Removal
MacScan can detect and remove DRPULogger Keylogger from your system, as well as provide protection against other security and privacy threats. A 30-day trial is available to scan your system for this threat.
Download MacScan
•
1 min read