Posted on 11/30/2004 1:29:41 PM PST by zeugma
We just had Mozilla Firefox installed, and that has really cut down on the pop-ups, esp from the DrudgeReport!
I do enjoy some of the extensions, such as the ability to remember passwords even on sites that try to prohibit that. Is there a system you recommend as an alternative to IE and Firefox?
Not 100% sure about Linspire but an educated guess would be 113/IDENT.
Bookmark for future edjumakashun....
You think they're doing a port re-map internally?
Now why would you say that since you also seem so confident that Macs are not vulnerable?
Two comments:
1. The honeypots were inactive; e.g., no email reading or web browsing to simulate real-world usage. I'd like to see this experiment repeated with some scripts on each machine running through a list of web sites as well as receiving and responding to spam. Each OS's resistance to the resultant malware attacks would be instructive.
2. The Mac in this experiment actually had some extra services turned on such as 'windows file sharing' ... and still wasn't compromised.
I'm confident I won't get into an accident driving home tonight, but I'll still wear my seat belt.
Can I just click on firefox and that's all I need...I don't need to buy anything?
I use a hardware firewall along with AnalogX script defender, Xp SP2, XP antispy, Spyware blocker, PC Pitstop security config, and Zone Alarm. I also use an antivirus, anti popup blocker, Ad-Aware, Spybot SD, PC cleaner, and tested my machine against GRC.com
I still feel vulnerable. :-(
Batten down those "cookie hatches" Ad-Aware and Spybot will NOT detect tracking cookies from Firefox. It uses the old Netscape cookie format that puts them into a single text file and those programs will not see them. I use accept only from originating site and delete when closing Firefox with good results but you can make it tighter.
Sage Project Wiki, check out the tutorial under getting started.
Guess you missed this part: The automated bot/worm attackers were exclusively using Windows-based attacks
First of all Mac OS 10.x comes with a firewall that blocks a number of the ports by default. I have no idea how they turned it off. The rest is just silly conjecture. There is no way of knowing what would happen if they intentionally tried to target the Mac operating system. There is no way of knowing from this article how easy it would be to code exploits for the mac.
Of course it could be done but the degree of vulnerability doesn't increase just because it hasn't been tried.
Actually Apple has been busy pathcing OSX this year. Here is one article on 15 of them:
http://www.eweek.com/article2/0,1759,1643902,00.asp
There are many more. Mac OS used to be CLI free and therefore fairly well protected. Now that it is just BSD with a Mac interface, there are plenty of things to look after when setting it up. Like anything else out there, configuration is key. Never attach a machine to any network until it is configured - as attested to by some of the previous comments.
Macs and OS X are your friends. The wintel brown shirts will claim higher costs, but with this crap as the alternative, the TCO is WAY below what a wintel POS costs to operate.
ping for info
But according to what I have read, there's little need to run an IDENT service nowadays. You can leave port 113 closed but not stealthed, and remote connections will work.
The IDENT protocol, as documented in RFC 1413, is really a hoot. Life was simpler in those days....
Interfaces are what they are. If they were left wide open on the Mac, you'd have the same result as with the Pee Cee or any other platform. There are no code mysteries left in the universe and there haven't been since they invented the computer.
Perhaps because you know that since XP was beefed up with SP2 it will be just matter of time till the hackers go after the more vulnerable Macs.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.