Chapter 17. Security, Boot Volumes, and Updating the System Software


Chapter 17. Security, Boot Volumes , and Updating the System Software

IN THIS CHAPTER:

133 Enable or Disable the Firewall

134 Add or Remove Firewall Rules

135 Extract a Password from the Keychain

136 Secure Your Files with FileVault

137 Run Software Update

138 Ignore an Update

139 Schedule Automatic Software Updates

140 Select the Boot Volume at Boot Time

141 Boot from Different Disks Using Keystrokes

142 Change the Startup Disk

As the owner of a computer with a multiuser operating system that's connected to the Internet, you must sooner or later face the unpleasant fact that you are responsible for certain administrative duties that rest on the shoulders of every conscientious computer user . It's the age of viruses, worms, Trojans, and any number of malicious Internet denizens whose sole purpose in life is to make life miserable for the rest of us by breaking into unguarded systems and generally taking advantage of the goodwill of anybody who doesn't keep his system well cared for. Because most of the well-publicized attacks are almost exclusively directed at Windows computers, you can generally rest assured that compared to a Windows user, you've got it easy.

However, Mac OS X is based on Unix, and the only thing keeping most Unix systems on the Internet secureaside from their relative obscurityis their ever-watchful system administrators, staying on top of all the latest vulnerabilities in Samba, Sendmail, BIND, OpenSSH, and the other unsung components of Unix. Now that every Mac is effectively a Unix system, Unix-style exploits threaten the consumer computing world, and every Mac user must assume some of the responsibilities of a full-fledged Unix guru. The free ride will end someday, and it's the casual computer users who haven't been keeping a close eye on their computers' security who will pay the highest price.

NOTE

If you use Microsoft Virtual PC to emulate a Windows environment on your Mac, that copy of Windows is susceptible to all the barrages that any Windows computer sustains. Windows viruses and spyware won't affect your Mac system, but you have to keep your Windows installation clean just as any PC user wouldand thus you have two systems to keep updated, not just one.


The tasks in this chapter explain some of the security features of Mac OS X, features that allow you to operate with transparency and ease while keeping the system buttoned up against possible attacks. You will also learn techniques for booting the computer from alternative volumes such as external disks, which might come in handy if you're managing a complex installation or if you have to troubleshoot a potential security problem. Finally, you will learn how to keep your system software as up-to-date as possible, sealing potential security breaches as soon as Apple and the vigilant Internet security community discover them.

WEB RESOURCE

http://macscan.securemac.com

MacScan is a downloadable utility designed to rid your Mac of spyware (software such as keystroke loggers, remote administration tools, and Trojans that might be installed without your knowledge). Very little spyware is targeted at the Mac these days, so the risk is much lower than with Windows, but this software helps you be appropriately vigilant.




MAC OS X Tiger in a Snap
Mac OS X Tiger in a Snap
ISBN: 0672327066
EAN: 2147483647
Year: 2001
Pages: 212
Authors: Brian Tiemann

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net