Chapter 17. Security, Boot Volumes , and Updating the System SoftwareIN THIS CHAPTER: 133 Enable or Disable the Firewall 134 Add or Remove Firewall Rules 135 Extract a Password from the Keychain 136 Secure Your Files with FileVault 137 Run Software Update 138 Ignore an Update 139 Schedule Automatic Software Updates 140 Select the Boot Volume at Boot Time 141 Boot from Different Disks Using Keystrokes 142 Change the Startup Disk As the owner of a computer with a multiuser operating system that's connected to the Internet, you must sooner or later face the unpleasant fact that you are responsible for certain administrative duties that rest on the shoulders of every conscientious computer user . It's the age of viruses, worms, Trojans, and any number of malicious Internet denizens whose sole purpose in life is to make life miserable for the rest of us by breaking into unguarded systems and generally taking advantage of the goodwill of anybody who doesn't keep his system well cared for. Because most of the well-publicized attacks are almost exclusively directed at Windows computers, you can generally rest assured that compared to a Windows user, you've got it easy. However, Mac OS X is based on Unix, and the only thing keeping most Unix systems on the Internet secureaside from their relative obscurityis their ever-watchful system administrators, staying on top of all the latest vulnerabilities in Samba, Sendmail, BIND, OpenSSH, and the other unsung components of Unix. Now that every Mac is effectively a Unix system, Unix-style exploits threaten the consumer computing world, and every Mac user must assume some of the responsibilities of a full-fledged Unix guru. The free ride will end someday, and it's the casual computer users who haven't been keeping a close eye on their computers' security who will pay the highest price. NOTE If you use Microsoft Virtual PC to emulate a Windows environment on your Mac, that copy of Windows is susceptible to all the barrages that any Windows computer sustains. Windows viruses and spyware won't affect your Mac system, but you have to keep your Windows installation clean just as any PC user wouldand thus you have two systems to keep updated, not just one. The tasks in this chapter explain some of the security features of Mac OS X, features that allow you to operate with transparency and ease while keeping the system buttoned up against possible attacks. You will also learn techniques for booting the computer from alternative volumes such as external disks, which might come in handy if you're managing a complex installation or if you have to troubleshoot a potential security problem. Finally, you will learn how to keep your system software as up-to-date as possible, sealing potential security breaches as soon as Apple and the vigilant Internet security community discover them. WEB RESOURCE http://macscan.securemac.com MacScan is a downloadable utility designed to rid your Mac of spyware (software such as keystroke loggers, remote administration tools, and Trojans that might be installed without your knowledge). Very little spyware is targeted at the Mac these days, so the risk is much lower than with Windows, but this software helps you be appropriately vigilant. |