Software‘I’ve posted patches for xnu that allow Mac OS X / Darwin to spoof MAC addresses, for use in conjunction with tools like Nemesis and Ettercap’ -peter
Installation
If you’re a seasoned Darwin user or developer, you likely have all the tools ready to go to build xnu, the Darwin kernel. If so, skip ahead to step 5. However, if you’re running Mac OS 10.0.x, there are several steps to go through:
Grab and install the developer tools from Apple’s developer site if you haven’t already.
make and make install relpath from the bootstrap_cmds …
August 6, 2001 •
2 min read
Mac TipsInformation
SKS or The Shift Key Suite 1.0.6 is an extension for your Macintosh to stop users from being able to hold down the shift key during startup to disable the extensions.
“Holding down the Shift key while booting your Macintosh prevents all extensions to load – an important feature when you have start-up crashes from incompatible extensions.”
Many Macintosh computers have simple security programs setup that are supposed to keep users out, if you do not see options in the preferences to disable the shift key during startup the user may be …
August 5, 2001 •
2 min read
SoftwareEttercap is a multipurpose sniffer/interceptor/logger for switched LAN. This program is fully unix based and was just ported to Mac OS X after a user requested it. If you are looking for your favorite unix based application to run on Mac OS X just give the programmers remote root so they don’t have to buy expensive hardware and they can do all the work from your box. 0.6.0 adds more support for Mac OS X!
Tools like this come in handy when programming, when you believe their is foul play happening, …
August 3, 2001 •
3 min read
SoftwareWhat is Firewalk?
Firewalk is a Mac OS X configuration utility for the built in firewall. While you are running Mac OS X you should be aware that you are running on a BSD/Mach kernal. The built in firewall that Mac OS X offers is rather dirty, some like to get into the unix part of the operating system others still prefer the nice Macintosh GUI. This application makes it possible for you to configure the firewall properly with the graphical user interface that Macintosh users are used to.
Firewalk X 2 …
July 12, 2001 •
2 min read
SoftwareInformation
Agax is an extensible free Mac anti-virus program. It offers both standard virus-scanning facilities and more advanced background protection – so you don’t get infected in the first place. Click on one of the links below to download Agax.
Views
Excellent free program. Protects against SevenDust, Autostart, and CODE9811. So this isn’t a full blown virus protection program yet; they are definitely adding the most current virus definitions!
Download Version
You can download Agax 1.3 from:
SecureMac – 1.3 version
Or try Downloading From:
Agax’s Website
Features
This is a snippet from the manual:
Agax is an anti-virus application. It …
July 11, 2001 •
9 min read
SoftwareWhat is Secure FTP Wrapper
Secure FTP Wrapper is a Java based program designed to easily make your existing FTP server compatible with Glub Tech’s Secure FTP client. In this release the wrapper allows for a Secure Sockets Layer, or SSL, connection to be made to your FTP server.
This Wrapper is supported by Mac OS X, Windows, and Linux running the Java 2 runtime environment
Instead of using the standard FTP Protocal transfering data in plain text you are using a enhanced version which offers encryption. If someone is watching (sniffing) your …
July 11, 2001 •
1 min read
SoftwareInformation
Password Key was designed to provide a limited amount of security to your Macintosh system with emphasis on “security without modification” in its processes. Even though it offers a fairly high level of security to the average “looker”, it does not in any way, affect either the hardware configuration, system software, or any of your files.
When used properly, Password Key should provide you with at least the knowledge of “illegal attempts” to enter your system, and at best, with a system that is left alone with its integrity kept complete.
Password …
July 9, 2001 •
3 min read
SoftwareComputer equipment is stolen every second around the world. What makes you believe your computer is any bit safer than the next guys. The concept of Stealth Signal is simple. When you use the Stealth Signal service your computer is being kept tabs on, so the next time someone steals your laptop of desktop computer they will help you locate it, read how…
How Stealth Signal Operates:
A small undetectable program (Stealth Signal Transmitter) is installed in your computer. This program silently tries to send a signal to our Monitoring Network at …
July 6, 2001 •
4 min read
Mac ClassicComputer equipment is stolen every second around the world. What makes you believe your computer is any bit safer than the next guys. The concept of Stealth Signal is simple. When you use the Stealth Signal service your computer is being kept tabs on, so the next time someone steals your laptop of desktop computer they will help you locate it, read how…
How Stealth Signal Operates
A small undetectable program (Stealth Signal Transmitter) is installed in your computer. This program silently tries to send a signal to our Monitoring Network at …
July 6, 2001 •
4 min read
Key LoggerInformation
Monitorer is a extension to record keystrokes as they are typed. Monitorer records everything you type with your keyboard and saves it. That can be very useful if you just wrote a very long text and your computer crashes. After restarting you will find the saved log-file in your preferences folder where you can copy your lost text! This application can also be used to check if any unauthorized person used your computer or you use it to view what your employees “produced” the whole day.
However Keystroke loggers were originally …
July 5, 2001 •
2 min read
SoftwareWhat is SSH Helper?
Secure Shell Helper allows you to easily manage your OpenSSH keys and account access data files. Main features of this program is the easy ability to Add and Remove authorized keys. You can also Generate SSH1 RSA, SSH2 RSA and SSH2 DSA keys. Included in this distinct GUI application you may also View/Export Your Public Keys. This is just another fine example of a GUI application to configure command-line options, if you are a die hard Macintosh users then this interface is right for you. If you …
July 4, 2001 •
1 min read
SoftwareInterested in computer security and hacking? This book is written from the system administrators stand point. Hundreds of pages on security issues, how to secure your system, how the hackers get it. Out of those pages there is a nice chapter on our favorite operating system Macintosh . Find a place for this book on your bookshelf as it makes a great companion to anyone interested in computer security. Even if your not interested in security now, you might run into the need for this book soon. Plus read up …
June 6, 2001 •
2 min read