SecurityNorton Personal Firewall is a excellent solution for stopping hackers from gaining unauthorized access to your computer. Setting up and configuring your firewall in the past has been a ugly time consuming task. Personal Firewall offers a simple out of the box installation protecting your Mac in minutes!
Why use a firewall?
SecureMac.com has reviewed many firewall solutions for your Macs. Many people ask us why should I use a firewall all I do on my computer is chat, email and go on the web. Every computer that has a network connection …
June 2, 2001 •
5 min read
SecurityWhat is NetBarrier?
NetBarrier is a personal firewall to protect you against hackers, vandals and other security risks for macintosh users that are connected to the internet. Experts estimate that 85%-97% undetected.
NetBarrier provides its “four-level line of defense” as a optimal security so that you can use the internet safely without leaving yourself vulnerable to any type of attacks.
The four-level line defense is as listed below
NetBarrier’s Personal Firewall protects and monitors all incoming and outgoing data. A customized mode allows you to create your own defense rules, offering the most …
June 2, 2001 •
5 min read
SecurityInformation
You can use ShredIt to shred files, folders, the free space on a disk, or the entire contents of a drive. It will shred data on the hard drive, an external hard drive, a floppy disk, a zip disk, windows formatted media, a RAM disk, any disk you can attach you can attach to your Macintosh (except Read-only disks and CD ROMs).
Configure ShredIt to ask you before it shreds so that you can confirm or cancel shredding.
Choose the overwrite pattern and the number of times it will overwrite the original …
June 2, 2001 •
2 min read
SecurityInformation
Security method. The Eraser Pro deletes your files by using a sophisticated procedure. It lets you customize many details of this job. The recovery of deleted files becomes impracticable: there’s no utility able to do it!
Simple method. You may also choose some details of this job.
The Eraser Pro returns several information while is using the features of above and allows you to stop its performance at any time. It works fine and fast in background, deleting large groups of items, you may also instruct it to ask you the permission, …
June 2, 2001 •
3 min read
SecurityInformation
Files deleted by the Macintosh through the trash can are easily recovered using most disk utilities, including Norton and MacTools. Burn securely erases data in sensitive files by overwriting the data one or more times before the file is deleted. When combined with encryption such as that provided by Enigma a user of Burn can keep their system’s sensitive data completely secure.
Views
Excellent program if you want to totally delete those secure files/images/directories. A must have for the people who want to keep anonymous and secure.
Download Version
You can download Tresor from:
SecureMac …
June 2, 2001 •
2 min read
SecurityInformation
Drop a file on this application to quickly and securely encrypt it, or decrypt previously encrypted files. Supports both QE’s original encryption format, and a text-based one, suitable for sending in the body of e-mail messages. Supports self-decrypting archives, so you can send encrypted data to another user without them needing to have QuickEncrypt.
Download Version
You can download Quick Encrypt 3.0.3 from:
SecureMac
Or try Downloading From:
Dejal’s FTP Site
Features
QuickEncrypt is very configurable and has many features, including archiving several files in one encrypted file, multiple worksets, user-controlled password limitations, default passwords, automatic encryption …
June 2, 2001 •
1 min read
SecurityInformation
No Longer for the Macintosh, No download, No Purchase.
Aladdin is the creator of the compression program ‘Stuffit Expander’. They have worked hard on all of their projects to ensure quality. Their programs are used by most of the macintosh community, and have been shown the respect they deserve. They have now released the program Private File. Just drag-and-drop to protect your sensitive files – simple, fast and easy. Whether you choose to drag and drop your files onto the desktop drop boxes, or select the files and then click on …
June 2, 2001 •
5 min read
SecurityInformation
PowerCrypt implements the major cryptographic methods, standards and hash algorithms: DES, IDEA, RSA, DSA, PKCS, MD2, MD5. As well, PowerCrypt implements the major secure e-mail protocols: PEM, S/MIME.
PowerCrypt handles standard X 400 certificates:
It stores received new certificates both as a local password protected copy and a public copy in a central Certificate Directory accessible to other users.
It creates new keys and prototype certificates for certificate requests
You can use it to implement a Certification Authority of your own, to certify your own certificates for your work group or friends. i.e. PGP …
June 2, 2001 •
1 min read
SecurityInformation
Privacy means that only the intended recipient of a message can read it. By providing the ability to encrypt messages, PGP provides protection against anyone eavesdropping on the network. Even if the information is intercepted, it is completely unreadable to the snooper. Authentication identifies the origin of the information, certainty that it is authentic, and that it has not been altered. Authentication also provides an extremely valuable tool in network security: verification of the identity of an individual. In addition to secure messaging, PGP also provides secure data storage, enabling …
June 2, 2001 •
4 min read
SecurityInformation
PGP Personal Security – 7.0.3 for Macintosh w/RSA – $19.95 USD – Strong, secure, protection for your hard disk, data, and email.. Available in: US or Canada only
Views
Excellent program, for those who remember 6.0.2 was free for a limited time. The current price of the product is 19.95 and you can purchase from mcafee online
Download Version
Download PGP Personal Security – 7.0.3
Features
Information privacy for individuals and businesses.
Secure e-mail and attachments with a single click.
Encrypt data on your hard drive automatically and transparently.
Create self-decrypting files and folders.
Securely “shred” files so they can …
June 2, 2001 •
1 min read
SecurityWhat is SSH Admin?
Secure Shell Admin allows you to easily configure and use the Secure Shell Daemon.
With Secure Shell Admin you have are setup easily with the 3 Step setup wizard. From there you may configure the server options and access lists. You can view the server messages in the log console and control the server easily ( Start/Stop/Restart )

June 2, 2001 •
1 min read
SecurityInformation
Snort is a lightweight network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Snort uses a flexible rules language to describe traffic that it should collect or pass, as well as a detection engine that utilizes a modular plugin architecture. Snort has a real-time alerting capability as …
June 2, 2001 •
3 min read
SecurityInformation
ContentBarrier offers content control, web filters, parental control and much more. ContentBarrier is made by Intego, the creators of the MacOS firewall NetBarrier. This software is primarily used for two targeted audiences, the parent who want to restrict young children from accessing the uncensored web; And the work place to protect the employer from liability, increase bandwidth and productivity.
Parental Control
If you don’t already know, the web can be a dangerous place because of the freely available content. ContentBarrier has predefined filters that let you choose what you don’t want your …
June 2, 2001 •
4 min read
SecurityInformation
IPNetSentry is a simple and intelligent security application which protects your Macintosh from outside Internet intruders. This is particularly important for Macintosh users who have cable modem, DSL, or another high-speed Internet service where connections can be maintained and left unattended for hours (or days) at a time.
Unlike most other Internet security products, IPNetSentry does not erect barriers for the safe use of your Internet connection. There is no need to “punch holes” in a firewall for specific applications you may wish to run. Instead, IPNetSentry silently and intelligently watches …
June 2, 2001 •
3 min read
SecurityWhat is OpenSSH
OpenSSH is a cost free version of the SSH protocol suite. Many of the users who utilize telnet, ftp, rlogin and other programs may not realize that their passwords are transmitted in plain text (unencrypted) across the Internet. The OpenSSH suite encrypts all data that comes to and from your computer including passwords.
The OpenSSH suite includes many functions and programs. SSH replaces rlogin and telnet, sftp replaces the plain ftp program and rcp is replaced with a enhanced scp program.
Luckily enough Apples new operating system, Mac OS X …
June 2, 2001 •
2 min read
SecurityInformation
DoorStop, from Open Door Networks, Inc., is a software-based “firewall” product for Macintosh servers. DoorStop is software that you install directly on the servers which you wish to protect. DoorStop is significantly easier to set up and use than a hardware firewall and provides the same capabilities at lower cost.
With DoorStop, you can specify precisely which machines should have access to which services, and you can keep track of both allowed and denied access attempts to those services. DoorStop works well with a wide range of Macintosh-based Internet servers, including …
June 2, 2001 •
2 min read
SecuritySecurity Bulletin Issued by Microsoft May 21, 2001
The following is the list of vulnerable products:
Microsoft Word 98 for the Mac
Microsoft Word 2001 for the Mac
Summary
When Microsoft Word opens a RTF (Rich Text Format) file that contains a link to a template, only the RTF file is checked for macros. When a a macro is embedded into the template file that was opened from a link in the RTF file an attacker could set the macro to run automatically and execute commands without your authorization – you even knowing …
May 21, 2001 •
2 min read
SecurityInformation
SuperLock is the premier shareware Macintosh security utility. It has been protecting Macs from casual snoopers since 1993, and it protected Macs for two years before that as a program called MacLauncher (which still works properly on the latest Macs!). It can be found on Macs all over the world belonging to students, teachers, governments, and normal, everyday people.
SuperLock 4.0.2 Lite is a slimmed-down version of SuperLock 4.0 Pro. Whereas SuperLock Pro is intended for settings like school labs where multiple people access one machine, SuperLock Lite is for Macs …
May 2, 2001 •
2 min read
Securitypublished: September 09, 2000
vulnerable: Intego’s NetBarrier (all versions) running on MaCOS
Discussion
Intego software (www.intego.com) offers a security software package for the Macintosh platform. The software is a firewall utility that allows the user to chose between different security schemes (server only, client only, customized, etc) and block different kind of known DoS (pingflood, synflood, ping of death, etc). One way of actually protecting the user from a remote attack such as a pingflood is to allow the user to block the ip from where the attack is performed. The software either …
September 9, 2000 •
4 min read
Securityalso known as OSX/KeystrokeWatch.A
-
-
- Last updated:
- 02/09/16 9:14 pm
-
Description
KeystrokesWatch is a keylogger.
KeystrokesWatch Threat Removal
MacScan can detect and remove KeystrokesWatch Keylogger from your system, as well as provide protection against other security and privacy threats. A 30-day trial is available to scan your system for this threat.
Download MacScan
•
1 min read