SecurityPassword weakness in Internet Config in MacOS What is Internet Config? From Internet Config FAQ: “The Internet Configuration System was designed to make your life easier by reducing the number of times which you need to enter your Internet preferences into the various preferences dialogs…
June 2, 2001 •
6 min read
SecurityInformation Euroda is a widely supported Email client for both Macs and PC’s. Pro Version supports multiple accounts and personalities. Views Eudora has grown a lot from user suggestions. They have a nice BETA SITE where you can beta test their PRO version. Download Versions…
June 2, 2001 •
2 min read
SecurityInformation Let me clarify something for all of you. BackOrifice, NetBus – Those are PC trojans. They will not break your macintosh. The tools described are to control a PC infected with BackOrifice from a MACINTOSH. Yes a Mac. Don’t fear Macs don’t have registries…
June 2, 2001 •
1 min read
SecurityConnections and Protections Cable and DSL Connections and Security Measures What type of connection do I have? Two new remote access technologies are rapidly growing – cable modems and Digital Subscriber Line (DSL) modems/routers. Cable Modems are a shared media. This means that you share…
June 2, 2001 •
6 min read
SecurityInformation John Copeland, a professor at Georgia Tech, noticed his computer sending packets when he was not conducting any traffic. This Mac Attack effects computers running MacOS 9 with a internet or network connection. A FAQ Page has been setup to help you understand the…
June 2, 2001 •
2 min read
SecurityGrouchySmurf is the first public release of an ICMP broadcast attack for the MacOS. Last night the application was released by Freaks Macintosh Archives a hacker related website for the macintosh community. They wrote a review/press release on the application to hype it. Now it…
June 2, 2001 •
4 min read
SecurityInformation Do you know that every single postscript file that you print on a Macintosh using the Print To File function actually secretly puts your email address in the file? Pretty scary, isn’t it? Problem Apple LaserWriter driver embeds the user email address within the…
June 2, 2001 •
1 min read
SecurityMac OS X Single User Mode Root Access – CodeSamurai Forward There’s always the constant battle between user-friendliness and security. Apple has known about this vulnerability for some time now; and back in the days of OpenStep, a patch to that OS was released to…
June 2, 2001 •
5 min read
SecurityMacintosh OS X Security – Third Lesson MAC OS X Now that we’ve covered the basics of computer security in general and an overview of Mac OS X security specifically, it is time to get a bit more in depth. Because some UNIX gurus and…
June 2, 2001 •
5 min read
SecurityMacintosh OS X Security – Second Lesson – Chevell MAC OS X The early adopters have been using OSX 10.0 for the better part of two weeks now. Early adopters, while not all the UNIX gurus and application developers Apple targeted the release for, are…
June 2, 2001 •
6 min read
SecurityIssue: Netscape Navigator/Communicator stores passwords in plain text remote: no local: yes published: September 12, 2000 vulnerable: Netscape Navigator/Communicator 4.x (and all versions?) Security Issue: There’s been a lot of security advisories and such about cookies security, but since the mac security is often very…
June 2, 2001 •
1 min read
SecuritySecurity Auditing Tools for the Macintosh In today’s media you only hear about hackers rummaging through data stealing important information. You hear about how your security becomes more and more insecure. All these hackers are hitting websites, stealing passwords and credit card numbers. Yes, it’s…
June 2, 2001 •
3 min read
SecurityInformation Keystroke loggers are common amongst hackers all around the world. Keystroke loggers do exactly what it says, it is a small program that logs to a file everything that you type and the person who installed the logger can retrieve the log whenever he/she…
June 2, 2001 •
3 min read
SecurityCable Modem and Macs Security Information Security Aspect: Macs and Cable Modems An issue has surfaced which has been ignored and avoided for a long time. In the past, people thought of Macintosh computers as being so secure that you didn’t even need to talk…
June 2, 2001 •
6 min read
SecurityNorton Personal Firewall is a excellent solution for stopping hackers from gaining unauthorized access to your computer. Setting up and configuring your firewall in the past has been a ugly time consuming task. Personal Firewall offers a simple out of the box installation protecting your…
June 2, 2001 •
5 min read
SecurityWhat is NetBarrier? NetBarrier is a personal firewall to protect you against hackers, vandals and other security risks for macintosh users that are connected to the internet. Experts estimate that 85%-97% undetected. NetBarrier provides its “four-level line of defense” as a optimal security so that…
June 2, 2001 •
5 min read
SecurityInformation You can use ShredIt to shred files, folders, the free space on a disk, or the entire contents of a drive. It will shred data on the hard drive, an external hard drive, a floppy disk, a zip disk, windows formatted media, a RAM…
June 2, 2001 •
2 min read
SecurityInformation Security method. The Eraser Pro deletes your files by using a sophisticated procedure. It lets you customize many details of this job. The recovery of deleted files becomes impracticable: there’s no utility able to do it! Simple method. You may also choose some details…
June 2, 2001 •
3 min read
SecurityInformation Files deleted by the Macintosh through the trash can are easily recovered using most disk utilities, including Norton and MacTools. Burn securely erases data in sensitive files by overwriting the data one or more times before the file is deleted. When combined with encryption…
June 2, 2001 •
2 min read
SecurityInformation Drop a file on this application to quickly and securely encrypt it, or decrypt previously encrypted files. Supports both QE’s original encryption format, and a text-based one, suitable for sending in the body of e-mail messages. Supports self-decrypting archives, so you can send encrypted…
June 2, 2001 •
1 min read