SecurityMacintosh OS X Security – Third Lesson
MAC OS X Now that we’ve covered the basics of computer security in general and an overview of Mac OS X security specifically, it is time to get a bit more in depth. Because some UNIX gurus and elite hackers now know Mac OS X better than most early-adopting Mac fans, caution needs to be taken above and beyond what has already been covered. This is because of the advanced capabilities of the new OS and the open source condition of many of the …
June 2, 2001 •
5 min read
SecurityMacintosh OS X Security – Second Lesson – Chevell
MAC OS X The early adopters have been using OSX 10.0 for the better part of two weeks now. Early adopters, while not all the UNIX gurus and application developers Apple targeted the release for, are zealous, ambitious and daring- perhaps too much so.
As I stated in my previous Mac OS X Security overview, Mac OS X is a completely new operating system to most Mac users. Its UNIX under pinnings are foreign to the point-and-click community. The interface is certainly foreign …
June 2, 2001 •
6 min read
SecurityIssue:
Netscape Navigator/Communicator stores passwords in plain text
remote: no
local: yes
published: September 12, 2000
vulnerable:
Netscape Navigator/Communicator 4.x (and all versions?)
Security Issue:
There’s been a lot of security advisories and such about cookies security, but since the mac security is often very different from other operating systems, this is worth of mention.
The problem is in fact very simple, Netscape stores saved passwords as cookies in a file called MagicCookie that can be found in the netscape user folder (different for each user created.) in the Preferences folder of the system folder (System Folder: Preferences: Netscape: …
June 2, 2001 •
1 min read
SecuritySecurity Auditing Tools for the Macintosh
In today’s media you only hear about hackers rummaging through data stealing important information. You hear about how your security becomes more and more insecure. All these hackers are hitting websites, stealing passwords and credit card numbers. Yes, it’s true a lot of this doesn’t pertain to the MacOS. It’s the Windows and UNIX servers being hacked. Yet it does happen. Administrators don’t take the right precautions to ensure their customers are secure. The customer is thought to be dumb. It is believed that not …
June 2, 2001 •
3 min read
SecurityInformation
Keystroke loggers are common amongst hackers all around the world. Keystroke loggers do exactly what it says, it is a small program that logs to a file everything that you type and the person who installed the logger can retrieve the log whenever he/she wants. Hackers use the software to gain information like logins/passwords or any other useful data.
TypeRecorder 1.5 is a shareware control panel created by Rampell Software. The software itself is marketed as a tool that would be useful in the case your system crashes, power outages or …
June 2, 2001 •
3 min read
SecurityCable Modem and Macs Security Information
Security Aspect: Macs and Cable Modems
An issue has surfaced which has been ignored and avoided for a long time. In the past, people thought of Macintosh computers as being so secure that you didn’t even need to talk about security. Since the early 90’s, there have been a few web sites dedicated to Macintosh security or hacking, all of which have surfaced, dissolved and expired.
Picture your network. You’re on one line, and your computer is only listening to its own traffic. But computers aren’t smart, …
June 2, 2001 •
6 min read
SecurityNorton Personal Firewall is a excellent solution for stopping hackers from gaining unauthorized access to your computer. Setting up and configuring your firewall in the past has been a ugly time consuming task. Personal Firewall offers a simple out of the box installation protecting your Mac in minutes!
Why use a firewall?
SecureMac.com has reviewed many firewall solutions for your Macs. Many people ask us why should I use a firewall all I do on my computer is chat, email and go on the web. Every computer that has a network connection …
June 2, 2001 •
5 min read
SecurityWhat is NetBarrier?
NetBarrier is a personal firewall to protect you against hackers, vandals and other security risks for macintosh users that are connected to the internet. Experts estimate that 85%-97% undetected.
NetBarrier provides its “four-level line of defense” as a optimal security so that you can use the internet safely without leaving yourself vulnerable to any type of attacks.
The four-level line defense is as listed below
NetBarrier’s Personal Firewall protects and monitors all incoming and outgoing data. A customized mode allows you to create your own defense rules, offering the most …
June 2, 2001 •
5 min read
SecurityInformation
You can use ShredIt to shred files, folders, the free space on a disk, or the entire contents of a drive. It will shred data on the hard drive, an external hard drive, a floppy disk, a zip disk, windows formatted media, a RAM disk, any disk you can attach you can attach to your Macintosh (except Read-only disks and CD ROMs).
Configure ShredIt to ask you before it shreds so that you can confirm or cancel shredding.
Choose the overwrite pattern and the number of times it will overwrite the original …
June 2, 2001 •
2 min read
SecurityInformation
Security method. The Eraser Pro deletes your files by using a sophisticated procedure. It lets you customize many details of this job. The recovery of deleted files becomes impracticable: there’s no utility able to do it!
Simple method. You may also choose some details of this job.
The Eraser Pro returns several information while is using the features of above and allows you to stop its performance at any time. It works fine and fast in background, deleting large groups of items, you may also instruct it to ask you the permission, …
June 2, 2001 •
3 min read
SecurityInformation
Files deleted by the Macintosh through the trash can are easily recovered using most disk utilities, including Norton and MacTools. Burn securely erases data in sensitive files by overwriting the data one or more times before the file is deleted. When combined with encryption such as that provided by Enigma a user of Burn can keep their system’s sensitive data completely secure.
Views
Excellent program if you want to totally delete those secure files/images/directories. A must have for the people who want to keep anonymous and secure.
Download Version
You can download Tresor from:
SecureMac …
June 2, 2001 •
2 min read
SecurityInformation
Drop a file on this application to quickly and securely encrypt it, or decrypt previously encrypted files. Supports both QE’s original encryption format, and a text-based one, suitable for sending in the body of e-mail messages. Supports self-decrypting archives, so you can send encrypted data to another user without them needing to have QuickEncrypt.
Download Version
You can download Quick Encrypt 3.0.3 from:
SecureMac
Or try Downloading From:
Dejal’s FTP Site
Features
QuickEncrypt is very configurable and has many features, including archiving several files in one encrypted file, multiple worksets, user-controlled password limitations, default passwords, automatic encryption …
June 2, 2001 •
1 min read
SecurityInformation
No Longer for the Macintosh, No download, No Purchase.
Aladdin is the creator of the compression program ‘Stuffit Expander’. They have worked hard on all of their projects to ensure quality. Their programs are used by most of the macintosh community, and have been shown the respect they deserve. They have now released the program Private File. Just drag-and-drop to protect your sensitive files – simple, fast and easy. Whether you choose to drag and drop your files onto the desktop drop boxes, or select the files and then click on …
June 2, 2001 •
5 min read
SecurityInformation
PowerCrypt implements the major cryptographic methods, standards and hash algorithms: DES, IDEA, RSA, DSA, PKCS, MD2, MD5. As well, PowerCrypt implements the major secure e-mail protocols: PEM, S/MIME.
PowerCrypt handles standard X 400 certificates:
It stores received new certificates both as a local password protected copy and a public copy in a central Certificate Directory accessible to other users.
It creates new keys and prototype certificates for certificate requests
You can use it to implement a Certification Authority of your own, to certify your own certificates for your work group or friends. i.e. PGP …
June 2, 2001 •
1 min read
SecurityInformation
Privacy means that only the intended recipient of a message can read it. By providing the ability to encrypt messages, PGP provides protection against anyone eavesdropping on the network. Even if the information is intercepted, it is completely unreadable to the snooper. Authentication identifies the origin of the information, certainty that it is authentic, and that it has not been altered. Authentication also provides an extremely valuable tool in network security: verification of the identity of an individual. In addition to secure messaging, PGP also provides secure data storage, enabling …
June 2, 2001 •
4 min read
SecurityInformation
PGP Personal Security – 7.0.3 for Macintosh w/RSA – $19.95 USD – Strong, secure, protection for your hard disk, data, and email.. Available in: US or Canada only
Views
Excellent program, for those who remember 6.0.2 was free for a limited time. The current price of the product is 19.95 and you can purchase from mcafee online
Download Version
Download PGP Personal Security – 7.0.3
Features
Information privacy for individuals and businesses.
Secure e-mail and attachments with a single click.
Encrypt data on your hard drive automatically and transparently.
Create self-decrypting files and folders.
Securely “shred” files so they can …
June 2, 2001 •
1 min read
SecurityWhat is SSH Admin?
Secure Shell Admin allows you to easily configure and use the Secure Shell Daemon.
With Secure Shell Admin you have are setup easily with the 3 Step setup wizard. From there you may configure the server options and access lists. You can view the server messages in the log console and control the server easily ( Start/Stop/Restart )

June 2, 2001 •
1 min read
SecurityInformation
Snort is a lightweight network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Snort uses a flexible rules language to describe traffic that it should collect or pass, as well as a detection engine that utilizes a modular plugin architecture. Snort has a real-time alerting capability as …
June 2, 2001 •
3 min read
SecurityInformation
ContentBarrier offers content control, web filters, parental control and much more. ContentBarrier is made by Intego, the creators of the MacOS firewall NetBarrier. This software is primarily used for two targeted audiences, the parent who want to restrict young children from accessing the uncensored web; And the work place to protect the employer from liability, increase bandwidth and productivity.
Parental Control
If you don’t already know, the web can be a dangerous place because of the freely available content. ContentBarrier has predefined filters that let you choose what you don’t want your …
June 2, 2001 •
4 min read
SecurityInformation
IPNetSentry is a simple and intelligent security application which protects your Macintosh from outside Internet intruders. This is particularly important for Macintosh users who have cable modem, DSL, or another high-speed Internet service where connections can be maintained and left unattended for hours (or days) at a time.
Unlike most other Internet security products, IPNetSentry does not erect barriers for the safe use of your Internet connection. There is no need to “punch holes” in a firewall for specific applications you may wish to run. Instead, IPNetSentry silently and intelligently watches …
June 2, 2001 •
3 min read