I think i might have angered some people into wanting to hack my computer. I dont think they are brilliant hackers, but i fear my system is not too hard to hack. Does anyone know any basic things i can do to keep the average computer user out?
You should always enable the firewall no matter what.
The more firewalls the better, you can never have enough protection.
I think i might have angered some people into wanting to hack my computer. I dont think they are brilliant hackers, but i fear my system is not too hard to hack. Does anyone know any basic things i can do to keep the average computer user out?
I think i might have angered some people into wanting to hack my computer. I dont think they are brilliant hackers, but i fear my system is not too hard to hack. Does anyone know any basic things i can do to keep the average computer user out?
Don't load software from untrusted sources. Don't follow links in email. Don't render HTML in email. Don't leave the system unattended. Don't have it automatically log you on a boot. Don't use untrusted media.
I think Apple would have us all believe that one need not bother with these precautions when using macs.
Yes, if they are running on the same machine... here we're talking about having one running on your computer and another on the router...I got told by an IT not to run too many though as they will interfere with each other and sometimes even block each other from doing certain things. I'm not sure how true it is but I use the one in OS X + the one in my router.
I think Apple would have us all believe that one need not bother with these precautions when using macs.
Distinguishing legitimate and malicious applications
Where you got the file is the most important indicator. Only download and install applications from trusted sources, such as well-known application publishers, authorized resellers, or other well-known distributors. It is also advisable to use antivirus software to scan any files before installation. A selection of third-party products may be found at the Macintosh Products Guide.
"Restrict access to rooms that have computers"
"Store computers in locked or secure containers when not in use"
"Require an Open Firmware of EFI password"
"Disable automatic login"
"Disable automatic actions for blank CDs for each user account"
"Disable automatic actions for blank DVDs for each user account"
"Disable automatic actions for music CDs for each user account"
"Disable automatic actions for video DVDs for each user account"
One common phishing technique is to include links in an email that look like they go to a legitimate website. However, upon closer inspection, the link may actually take you to a website that has nothing to do with the company the email is pretending to be from, even though the resulting website may be designed to look exactly the same.
In Mac OS X 10.4, Mail can help identify these type of links. Simply mouse over (but don't click) any link in an email, and you will see a pop-up that shows you the actual URL that you will be taken to.
All good advice, really... except for point 5 which actually doesn't add any real security, since it's very easy to circumvent, and as long as you carefully follow point 4, it's not necessary at all...4. Don't leave the system unattended.
5. Don't have it automatically log you on at boot.
The more firewalls the better, you can never have enough protection.
Ummmm,,, I humbly beg to differ. In my case, I have a Netgear router, which has both NAT + SPI firewall built-in. My understanding, and I could be mistaken, is that a h/w firewall trumps a s/w firewall.
Lastly, according to Pogue's book [], "if you have a router, you can turn off your Apple firewall".
![]()
All good advice, really... except for point 5 which actually doesn't add any real security, since it's very easy to circumvent, and as long as you carefully follow point 4, it's not necessary at all...![]()
There are lots of misperceptions about firewalls. Most firewalls are not that intelligent, they simply limit which ports can be used, and which direction they can be used in.
Well, I do see the point of locking the screen (Keychain access -> preferences -> General and check Show status in Menu Bar) when leaving an otherwise secured Mac for a few seconds or even a minute, because the reboot-from-os-x-disc-and-change-password takes some time, but I don't bother with disabling automatic login...The "Belt and suspenders" approach to security means having overlapping security controls is a good thing. I didn't add the screensaver password thing, which I should have. In an office environment, the most damaging intrusions often come from those who have physical access to the facility. That often goes for schools and fairly often for homes as well.
Well, I do see the point of locking the screen (Keychain access -> preferences -> General and check Show status in Menu Bar) when leaving an otherwise secured Mac for a few seconds or even a minute, because the reboot-from-os-x-disc-and-change-password takes some time, but I don't bother with disabling automatic login...