SecurityGrouchySmurf is the first public release of an ICMP broadcast attack for the MacOS. Last night the application was released by Freaks Macintosh Archives a hacker related website for the macintosh community. They wrote a review/press release on the application to hype it. Now it…
June 2, 2001 •
4 min read
SecurityInformation Do you know that every single postscript file that you print on a Macintosh using the Print To File function actually secretly puts your email address in the file? Pretty scary, isn’t it? Problem Apple LaserWriter driver embeds the user email address within the…
June 2, 2001 •
1 min read
SecurityMac OS X Single User Mode Root Access – CodeSamurai Forward There’s always the constant battle between user-friendliness and security. Apple has known about this vulnerability for some time now; and back in the days of OpenStep, a patch to that OS was released to…
June 2, 2001 •
5 min read
SecurityMacintosh OS X Security – Third Lesson MAC OS X Now that we’ve covered the basics of computer security in general and an overview of Mac OS X security specifically, it is time to get a bit more in depth. Because some UNIX gurus and…
June 2, 2001 •
5 min read
SecurityMacintosh OS X Security – Second Lesson – Chevell MAC OS X The early adopters have been using OSX 10.0 for the better part of two weeks now. Early adopters, while not all the UNIX gurus and application developers Apple targeted the release for, are…
June 2, 2001 •
6 min read
SecurityIssue: Netscape Navigator/Communicator stores passwords in plain text remote: no local: yes published: September 12, 2000 vulnerable: Netscape Navigator/Communicator 4.x (and all versions?) Security Issue: There’s been a lot of security advisories and such about cookies security, but since the mac security is often very…
June 2, 2001 •
1 min read
SecuritySecurity Auditing Tools for the Macintosh In today’s media you only hear about hackers rummaging through data stealing important information. You hear about how your security becomes more and more insecure. All these hackers are hitting websites, stealing passwords and credit card numbers. Yes, it’s…
June 2, 2001 •
3 min read
SecurityInformation Keystroke loggers are common amongst hackers all around the world. Keystroke loggers do exactly what it says, it is a small program that logs to a file everything that you type and the person who installed the logger can retrieve the log whenever he/she…
June 2, 2001 •
3 min read
SecurityCable Modem and Macs Security Information Security Aspect: Macs and Cable Modems An issue has surfaced which has been ignored and avoided for a long time. In the past, people thought of Macintosh computers as being so secure that you didn’t even need to talk…
June 2, 2001 •
6 min read
SecurityNorton Personal Firewall is a excellent solution for stopping hackers from gaining unauthorized access to your computer. Setting up and configuring your firewall in the past has been a ugly time consuming task. Personal Firewall offers a simple out of the box installation protecting your…
June 2, 2001 •
5 min read
SecurityWhat is NetBarrier? NetBarrier is a personal firewall to protect you against hackers, vandals and other security risks for macintosh users that are connected to the internet. Experts estimate that 85%-97% undetected. NetBarrier provides its “four-level line of defense” as a optimal security so that…
June 2, 2001 •
5 min read
SecurityInformation You can use ShredIt to shred files, folders, the free space on a disk, or the entire contents of a drive. It will shred data on the hard drive, an external hard drive, a floppy disk, a zip disk, windows formatted media, a RAM…
June 2, 2001 •
2 min read
SecurityInformation Security method. The Eraser Pro deletes your files by using a sophisticated procedure. It lets you customize many details of this job. The recovery of deleted files becomes impracticable: there’s no utility able to do it! Simple method. You may also choose some details…
June 2, 2001 •
3 min read
SecurityInformation Files deleted by the Macintosh through the trash can are easily recovered using most disk utilities, including Norton and MacTools. Burn securely erases data in sensitive files by overwriting the data one or more times before the file is deleted. When combined with encryption…
June 2, 2001 •
2 min read
SecurityInformation Drop a file on this application to quickly and securely encrypt it, or decrypt previously encrypted files. Supports both QE’s original encryption format, and a text-based one, suitable for sending in the body of e-mail messages. Supports self-decrypting archives, so you can send encrypted…
June 2, 2001 •
1 min read
SecurityInformation No Longer for the Macintosh, No download, No Purchase. Aladdin is the creator of the compression program ‘Stuffit Expander’. They have worked hard on all of their projects to ensure quality. Their programs are used by most of the macintosh community, and have been…
June 2, 2001 •
5 min read
SecurityInformation PowerCrypt implements the major cryptographic methods, standards and hash algorithms: DES, IDEA, RSA, DSA, PKCS, MD2, MD5. As well, PowerCrypt implements the major secure e-mail protocols: PEM, S/MIME. PowerCrypt handles standard X 400 certificates: It stores received new certificates both as a local password…
June 2, 2001 •
1 min read
SecurityInformation Privacy means that only the intended recipient of a message can read it. By providing the ability to encrypt messages, PGP provides protection against anyone eavesdropping on the network. Even if the information is intercepted, it is completely unreadable to the snooper. Authentication identifies…
June 2, 2001 •
4 min read
SecurityInformation PGP Personal Security – 7.0.3 for Macintosh w/RSA – $19.95 USD – Strong, secure, protection for your hard disk, data, and email.. Available in: US or Canada only Views Excellent program, for those who remember 6.0.2 was free for a limited time. The current…
June 2, 2001 •
1 min read
SecurityWhat is SSH Admin? Secure Shell Admin allows you to easily configure and use the Secure Shell Daemon. With Secure Shell Admin you have are setup easily with the 3 Step setup wizard. From there you may configure the server options and access lists. You…
June 2, 2001 •
1 min read