Softwarepublished: September 09, 2000
vulnerable: Intego’s NetBarrier (all versions) running on MaCOS
Discussion
Intego software (www.intego.com) offers a security software package for the Macintosh platform. The software is a firewall utility that allows the user to chose between different security schemes (server only, client only, customized, etc) and block different kind of known DoS (pingflood, synflood, ping of death, etc). One way of actually protecting the user from a remote attack such as a pingflood is to allow the user to block the ip from where the attack is performed. The software either …
September 9, 2000 •
4 min read
SoftwareInformation
SuperLock is the premier shareware Macintosh security utility. It has been protecting Macs from casual snoopers since 1993, and it protected Macs for two years before that as a program called MacLauncher (which still works properly on the latest Macs!). It can be found on Macs all over the world belonging to students, teachers, governments, and normal, everyday people.
SuperLock 4.0.2 Lite is a slimmed-down version of SuperLock 4.0 Pro. Whereas SuperLock Pro is intended for settings like school labs where multiple people access one machine, SuperLock Lite is for Macs …
May 2, 2001 •
2 min read
Mac ClassicSecurity Bulletin Issued by Microsoft May 21, 2001
The following is the list of vulnerable products:
Microsoft Word 98 for the Mac
Microsoft Word 2001 for the Mac
Summary
When Microsoft Word opens a RTF (Rich Text Format) file that contains a link to a template, only the RTF file is checked for macros. When a a macro is embedded into the template file that was opened from a link in the RTF file an attacker could set the macro to run automatically and execute commands without your authorization – you even knowing …
May 21, 2001 •
2 min read
SoftwareInformation
DoorStop, from Open Door Networks, Inc., is a software-based “firewall” product for Macintosh servers. DoorStop is software that you install directly on the servers which you wish to protect. DoorStop is significantly easier to set up and use than a hardware firewall and provides the same capabilities at lower cost.
With DoorStop, you can specify precisely which machines should have access to which services, and you can keep track of both allowed and denied access attempts to those services. DoorStop works well with a wide range of Macintosh-based Internet servers, including …
June 2, 2001 •
2 min read
Mac ClassicWhat is OpenSSH
OpenSSH is a cost free version of the SSH protocol suite. Many of the users who utilize telnet, ftp, rlogin and other programs may not realize that their passwords are transmitted in plain text (unencrypted) across the Internet. The OpenSSH suite encrypts all data that comes to and from your computer including passwords.
The OpenSSH suite includes many functions and programs. SSH replaces rlogin and telnet, sftp replaces the plain ftp program and rcp is replaced with a enhanced scp program.
Luckily enough Apples new operating system, Mac OS X …
June 2, 2001 •
2 min read
Mac ClassicInformation
IPNetSentry is a simple and intelligent security application which protects your Macintosh from outside Internet intruders. This is particularly important for Macintosh users who have cable modem, DSL, or another high-speed Internet service where connections can be maintained and left unattended for hours (or days) at a time.
Unlike most other Internet security products, IPNetSentry does not erect barriers for the safe use of your Internet connection. There is no need to “punch holes” in a firewall for specific applications you may wish to run. Instead, IPNetSentry silently and intelligently watches …
June 2, 2001 •
3 min read
SoftwareInformation
ContentBarrier offers content control, web filters, parental control and much more. ContentBarrier is made by Intego, the creators of the MacOS firewall NetBarrier. This software is primarily used for two targeted audiences, the parent who want to restrict young children from accessing the uncensored web; And the work place to protect the employer from liability, increase bandwidth and productivity.
Parental Control
If you don’t already know, the web can be a dangerous place because of the freely available content. ContentBarrier has predefined filters that let you choose what you don’t want your …
June 2, 2001 •
4 min read
Mac TipsInformation
Snort is a lightweight network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Snort uses a flexible rules language to describe traffic that it should collect or pass, as well as a detection engine that utilizes a modular plugin architecture. Snort has a real-time alerting capability as …
June 2, 2001 •
3 min read
SoftwareWhat is SSH Admin?
Secure Shell Admin allows you to easily configure and use the Secure Shell Daemon.
With Secure Shell Admin you have are setup easily with the 3 Step setup wizard. From there you may configure the server options and access lists. You can view the server messages in the log console and control the server easily ( Start/Stop/Restart )

June 2, 2001 •
1 min read
SoftwareInformation
PGP Personal Security – 7.0.3 for Macintosh w/RSA – $19.95 USD – Strong, secure, protection for your hard disk, data, and email.. Available in: US or Canada only
Views
Excellent program, for those who remember 6.0.2 was free for a limited time. The current price of the product is 19.95 and you can purchase from mcafee online
Download Version
Download PGP Personal Security – 7.0.3
Features
Information privacy for individuals and businesses.
Secure e-mail and attachments with a single click.
Encrypt data on your hard drive automatically and transparently.
Create self-decrypting files and folders.
Securely “shred” files so they can …
June 2, 2001 •
1 min read
SoftwareInformation
Privacy means that only the intended recipient of a message can read it. By providing the ability to encrypt messages, PGP provides protection against anyone eavesdropping on the network. Even if the information is intercepted, it is completely unreadable to the snooper. Authentication identifies the origin of the information, certainty that it is authentic, and that it has not been altered. Authentication also provides an extremely valuable tool in network security: verification of the identity of an individual. In addition to secure messaging, PGP also provides secure data storage, enabling …
June 2, 2001 •
4 min read
SoftwareInformation
PowerCrypt implements the major cryptographic methods, standards and hash algorithms: DES, IDEA, RSA, DSA, PKCS, MD2, MD5. As well, PowerCrypt implements the major secure e-mail protocols: PEM, S/MIME.
PowerCrypt handles standard X 400 certificates:
It stores received new certificates both as a local password protected copy and a public copy in a central Certificate Directory accessible to other users.
It creates new keys and prototype certificates for certificate requests
You can use it to implement a Certification Authority of your own, to certify your own certificates for your work group or friends. i.e. PGP …
June 2, 2001 •
1 min read