Does having an anti virus affect EasyLink set up?

Easylink set up isn't finding my internet when I first set up.
Is this because of anti viruses?

It could happen, So why don't you try to disable all the anti virus and firewalls and the install Easylink.

Similar Messages

  • Does mac need anti-virus software?

    I've been hearing lots of different opinions and I just want a straightforward answer, do macs need anti-virus software, are they prone to threatening infection?

    Macathon1996 wrote:
    Even if I download alot of files, perhaps from "uncertified users"?
    That depends. No anti-virus or anti-malware protection in the world can stop you from downloading and installing software that does whatever it is designed to do. If you want to install a program that wipes your hard disk, you can. If you want to install a program that steals your passwords, you can. There are many legitimate programs that do exactly that.
    Nothing can stop you from installing software on your Mac except you. That's what computers are designed for. The point is that you must always know what you're installing, why you're installing it, what you expect it to do, and how to get rid of it when you don't want it.

  • Lumia 800 - Does it need Anti Virus software?

    I've searched the market place and can not find any anti virus software. 
    How is the phone protected from attack if it doesnt have any?
    Thanks

    Like the iphone due to the way the OS is designed and the way apps are provided it is impervious to virus attacks. That being the case it doesn't need any anti-virus software.
    You can find a lot more detailed info about this topic by searching google.

  • Does Having a .Mac Address Affect Google Rankings?

    I have a fairly new iWeb-generated website that was started around May 1. I wrote an article on my site about a new hostess for a poker TV show (I'm a poker reporter), and my page has sustained a #3 ranking on Google for about a month. (The article has received over 8,000 hits over five weeks.)
    A friend tells me that it's unheard of for a new site like mine to rank so highly on Google, and insists that it's only because my core domain is ".Mac". Either Apple is specifically "pushing" or "accelerating" my page to Google, or Google is weighing me more highly because I benefit from .Mac's high Alexa ranking.
    So my question is this: Does Google rank my pages differently because the domain is Mac.com and not (for example) PokerReporterBJ.com?
    Also, does Apple do anything to "push" or "accelerate" its member pages to search engines like Google? I believe that having a .Mac address might put me on Google's "radar" faster (meaning I'll show up SOMEWHERE in the rankings), but I don't believe it affects the actual page rank.
    Does anyone know anything about this?
    Here's the link to my main page:
    http://web.mac.com/bjnemeth
    And a link to the specific article:
    http://web.mac.com/bjnemeth/iWeb/BJNemeth/Blog/50351FA7-E684-11DA-B3DD-000A95D91 B0C.html
    PowerMac G5   Mac OS X (10.3.9)   I also have a late 2001 iBook

    Thanks for the responses, everyone. I think I agree with all of you.
    However, I did find one source saying your domain can affect Google rankings. Here's the link:
    http://www.searchenginepromotionhelp.com/m/articles/site-content-design/google-d omain-names.php
    However, the point of this article is that Google tracks domains and domain-hosting services for a history of spamming, giving less weight to historical spammers.
    So Google may punish your ranking if you're with a disreputable hosting service, but they won't reward you just because you're with dotMac or another major domain. It just puts you on an even playing field with the rest of the Internet. (Which is as it should be.)
    Like I said, thanks for the responses!
    PowerMac G5   Mac OS X (10.3.9)   I also have a late 2001 iBook

  • Does the Mac need anti-virus software?

    I have been told the Mac does not need anti-virus software. I have Kapersky on my Mac now and was told to take it off.  I was told Apple updates the protection software daily.  Any thoughts?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. OS X security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. XProtect, Gatekeeper, and MRT reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use one of the free anti-virus products in the Mac App Store — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. An anti-malware product from the App Store, such as "ClamXav," doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An anti-virus app is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    Anti-virus software may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use the software unless a network administrator requires you to do it.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer is going to be infected every time you install an application, read email, or visit a web page. But neither should you have the false idea that you will always be safe, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • My bank has offered me Kaspersky Anti-Virus 2011 for Mac for Free, should I bother?

    Thoughts?
    I am a reasonably experienced Mac user, have never had a problem (that I am aware of) with security on my iMac.
    I'm erring towards, what's the point, why bother.
    But I thought I would throw it out there?
    Perhaps another question is, what steps should I ensure that I have done to MAXIMISE the security that is built into OSX?
    I am running 10.6.8
    Thanks,

    Chipstix wrote:
     what steps should I ensure that I have done to MAXIMISE the security that is built into OSX?
    Don't do any online banking with amounts your not comfortable losing.
    Keep the bulk of your funds entirely on your banks electronic systems accessible only in person and transfer as needed to less secure accounts that are on ATM/checking/debit card type accounts.
    It annoys my bank to no end that I come in once every month or two to transfer money and gets some cash, but it puts people to work and I don't get ripped off.
    If you've read the horror stories I have where people's entire online accounts gets transferred to another country with little enforcement or extradition, you would do the same.
    Mac's are a bit more secure than Windows, but it's really just smarter choices playing on Roulete, eventually you play long enough the House takes your money no matter how good your luck or skill is.
    So the smart choice is don't play, or only take to the table what your willing to lose.
    All your doing with installing anti-virus on a Mac is cleaning the Windows files if you got malware on them, it's not doing you a bit of good.
    OS X already has XProtect watching for malicious trojans, and your not a dumb smuck that will install a trojan, so there is currently no need for anti-virus, causes more problems that it solves as Apple changes things all the time, which throws off the anti-virus software and gives errors, false positives or hozes the system, even creates security vulnerabilites!
    There is new malware all the time, operating systems are flawed, especially Lion. It's like Apple is capitalizing on all the free security support of the computer community and just throws a unproven OS X version out there and allows it's user base to be guinne pigs.
    https://threatpost.com/en_us/blogs/apple-ships-mammoth-security-update-101311

  • Anti-Virus for Win7- LR4

    Can anyone indicate what Anti-Virus is being used succesfully with Win7 (64bit) and LR4? i understand that LR4 is quite finiky about having any Anti-Virus software looming around.

    At the recommendation of my computer system builder (Puget Systems, a bit expensive but top notch for custom systems) I am using the free Microsoft Security Essentials:
    http://windows.microsoft.com/en-US/windows/products/security-essentials
    Updates daily, free, unobstrusive.  What's not to like?

  • Anti virus for incredible

    Has anyone found an anti virus worthy of downloading? And that doesn't drain the battery down constantly scanning the phone.

    Iuse lookout mobile, works great, free from the market, but I have heard that android does not need anti-virus, I'm just paranoid.

  • Anti-virus software for MacBook

    Hi, I came across plug in for enhancing the efficiency of MacBook and protecting it against viruses. My question is: Does MacBook require anti-virus software such as MacKeeper? Or is this software a malware?
    Thanks, Chaitanya Mehta

    ... Does MacBook require anti-virus software such as MacKeeper? Or is this software a malware?
    I consider MacKeeper "malware" and so do many others. OS X already contains all that is necessary to protect itself from viruses. The best thing you can do is ensure your OS is updated using Software Update.
    Never install anything without knowing exactly what it is, what it does, and how to eradicate it should it do something you do not want. Never supply your user name and password to something just because a popup window requests it.
    You should also consider using OpenDNS which has recently been improved to prevent certain malware from spreading. It's free and has many other useful features.

  • Downloading installer works, but installation does not. Nothing happens. New laptop with Win 7 (no earlier Firefox version) & Norton Anti-virus. 3rd Firefox

    When I click button to install now, it only restarts the EZ download installer again. I've gone through the process at least 15 times now. I installed FireFox twice before on Windows XP with no issue. I've tried by turning off Norton, computer shut down & restarts, searched Internet Explorer settings for a setting to change, and still no success. I see no one else having this problem in the troubleshooting files, so it must be me.
    New laptop with plenty of harddrive space. Internet Explorer version 9.0.8112.16421. Bing search - yech

    finitarry,
    Thank you for contributing.
    I have downloaded the 607 KB "Firefox_Setup_19.0.2.exe" file four times now from at least three different Mozilla websites via EZDownload. I was very careful about that because one time I did it with Norton Anti-virus temporarily disabled. I double-click on the above file and it opens a new window with various "extra" software options and finally arrives at "Install Now" or "Later" buttons. Clicking"Install Now" brings up a Windows Open File - Security Warning box with "Run" or "Cancel" buttons. Clicking "Run" starts the setup file all over. I'm in an endless do-loop. It never installs Firefox and no new Firefox files show up on my PC.
    AliceWyman,
    Thank you for contributing.
    Before beginning this post, I scoured the Support files and especially the "Download, Install and Migration" help files. Most topics close to mine deal with the Norton toolbar, which seems to have been resolved.
    Doing some more looking, I found that my setup file was always 607KB, yet the website says it is 19.6MB. When I download it to my Windows 7 laptop, I have gotten a 607 KB size file four times, even though the process did not seem to be interrupted. However, using my Windows XP PC, I get 19.6MB. That could be the problem. I'll transfer the 19.6MB file from the XP to Win7 and see if that works. Thanks. I'll get back to you.
    3/24/2013: It worked. Hallelujah!
    Someone might want to verify this only happens to me. Maybe it is one of my settings or a fluke or maybe I'm paranoid, but a brand-new laptop with Windows 7 factory-installed stops the Firefox download at 607KB four times in a row (on different days) with no error message. I have to transfer the file from an old Windows XP PC. That sounds to me like Microsoft is trying to prevent the use of Firefox. It could have been something in Windows 7 Home Premium (service pack 1), Internet Explorer (version 9.0.8112.16421 64-bit), Bing, or less likely, Norton Anti-Virus (because I ran it disabled one time - even though Norton labelled the file as medium risk). Just a thought . . .
    Right now, I am happily setting up the rest of my system around the quicker, more efficient, more user-friendly, less restricting, Firefox browser. Thank you. =)

  • Does my iMac need anti-virus software

    I've read recently that iMacs have been susceptable to viruses.  Does my iMac need anti-virus software?  And if so, d0es Apple recommend any one in particular?

    Mac OS X versions 10.6.7 and later have built-in detection of known Mac malware in downloaded files. The recognition database is automatically updated once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders. In most cases, there’s no benefit from any other automated protection against malware.
    The most effective defense against malware is your own intelligence. All known malware that affects a fully-updated installation of Mac OS X 10.6 or later takes the form of trojans, which can only work if the victim is duped into running them. If you're smarter than the malware attacker thinks you are, you won't be duped. That means, primarily, that you never install software from an untrustworthy source. How do you know a source is untrustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” or “certificate” that comes from that same site, or an unknown site, merely in order to use the site, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim.
    “Cracked” versions of commercial software downloaded from a bittorrent are likely to be infected.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. No intermediary is acceptable.
    Disable Java (not JavaScript) in your web browser(s). Few websites have Java content nowadays, so you won’t be missing much. This setting is mandatory in Mac OS X 10.5.8 or earlier, because Java in those versions has bugs that make it unsafe to use on the Internet. Those bugs will probably never be fixed, because those older operating systems are no longer being maintained by Apple. Migrate to a newer version of the Mac OS as soon as you can.
    Follow these guidelines, and you’ll be as safe from malware as you can reasonably be.
    Never install any commercial "anti-virus" products for the Mac, as they all do more harm than good. If you need to be able to detect Windows malware in your files, use ClamXav — nothing else.

  • What is the firewall in the macbook pro OS X and which anti-virus does it have?

    I need to know the firewall in my computer and which anti-virus does it have?

    Mory89 wrote:
    I need to know the firewall in my computer and which anti-virus does it have?
    The System Preferences >Security >Firewall is a incoming one and very user simple.
    There is the full outgoing and incoming firewall via the Terminal
    NoobProof and WaterRoof that can manage it with a GUI.
    Mac's have a System Preferences > Security > General > Safe Downloads list which basically checks your downloads to make sure it's not a trojan.
    That's about it for the malware checks built in, most all malware is for Windows and doesn't affect OS X, but if your passing or using Windows files, you may want to use the free ClamXav to scan them.
    ClamXav is non-intrusive, other anti-malware for Mac's can be harmful as they run as root level and Apple changes things which breaks the anti-malware software and really causes more hassle than the 0 viruses Mac's get.
    So most Mac users don't need to mess with the Firewall or anti-malware, best for them to leave it alone.
    Though if one installs software from pirate or questionable sources then all bets are off.

  • Does mac pro need an anti virus or not? please advise thanks

    hi i'm new mac pro user i would like to ask you if i need to buy anti virus to  my computer
    thanks

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets (see below.)
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been another layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't actually been tested by Apple (unless it comes from the Mac App Store), but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. For most practical purposes, applications recognized by Gatekeeper as signed can be considered safe.
    Gatekeeper has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could find some other way to evade Apple's controls.
    For more information about Gatekeeper, see this Apple Support article.
    4. Beyond XProtect and Gatekeeper, there’s no benefit, in most cases, from any other automated protection against malware. The first and best line of defense is always your own intelligence. All known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source. How do you know whether a source is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    5. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was never a good idea, and Java's developers have had a lot of trouble implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style "virus" affecting OS X. Merely loading a page with malicious Java content could be harmful. Fortunately, Java on the Web is mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers. In Safari, this is done by unchecking the box marked Enable Java in the Security tab of the preferences dialog.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a specific task, enable Java only when needed for the task and disable it immediately when done. Close all other browser windows and tabs, and don't visit any other sites while Java is active. Never enable Java on a public web page that carries third-party advertising. Use it only on well-known, password-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow these guidelines, and you’ll be practically as safe from malware as you can be.
    6. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use the free software ClamXav — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    7. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    8. The greatest harm done by anti-virus software, in my opinion, is in its effect on human behavior. It does little or nothing to protect people from emerging threats, but they get a false sense of security from it, and then they may behave in ways that expose them to higher risk. Nothing can lessen the need for safe computing practices.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.

  • Does OS X 10.5 come with any built-in anti virus?

    Is there any anti-virus built into OS X 10.5?   Does it work automatically or require manual setup etc...?    My daughter's Macbook (she's away at Uni) has been running fine for 4 years but suddenly keeps crashing and I'm wondering if she's got a virus (the Macbook, not my daughter!)

    Hi, not likely a virus, & there is minimal protection in 10.5.8 & up...
    About Safari 5.1.7 and Leopard Security Update 2012-003
    Summary
    Learn about Safari 5.1.7 and Leopard Security Update 2012-003.
    Products Affected
    Mac OS X 10.5, Product Security, Safari 5.1 (Mac OS X 10.6), Safari 5.1 (OS X Lion)
    Safari 5.1.7 for OS X Lion, Safari 5.1.7 for OS X Snow Leopard, and Leopard Security Update 2012-003 disable out-of-date versions of Adobe Flash Player.
    Out-of-date versions of Adobe Flash Player do not include the latest security updates and will be disabled to help keep your Mac secure. If Safari 5.1.7 or Leopard Security Update 2012-003 detects an out-of-date version of Flash Player on your system, you will see a dialog informing you that Flash Player has been disabled. The dialog provides the option to go directly to Adobe's website, where you can download and install an updated version of Flash Player.
    Additional Information
    If you need to re-enable an out-of-date version of Flash Player, you can do the following:
        1.    Navigate to the /Library/Internet Plug-Ins (Disabled) folder.
        2.    Drag "Flash Player.plugin" into /Library/Internet Plug-Ins.
        3.    If the browser is running, quit and restart it.
    http://support.apple.com/kb/HT5271
    If you or her really think she needs it...
    ClamXAV, free Virus scanner...
    http://www.clamxav.com/
    Free Sophos...
    http://www.sophos.com/en-us/products/free-tools/sophos-antivirus-for-mac-home-ed ition/features.aspx
    But have her do this first...
    Safe Boot from the HD, (holding Shift key down at bootup), run Disk Utility in Applications>Utilities, then highlight your drive, click on Repair Permissions, reboot.
    If still problems, then...
    See if the Disk is issuing any S.M.A.R.T errors in Disk Utility...
    http://support.apple.com/kb/PH7029
    Open Activity Monitor in Applications>Utilities, select All Processes & sort on CPU%, any indications there?
    How much RAM & free space do you have also, click on the Memory & Disk Usage Tabs.
    Open Console in Utilities & see if there are any clues or repeating messages when this happens.
    In the Memory tab of Activity Monitor, are there a lot of Pageouts?

  • Does macbook have an anti virus sofware

    what anti-virus does macbook pro use

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could find some other way to bypass Apple's oversight, or the oversight could fail in a particular case due to human error.
    For most purposes, applications recognized by Gatekeeper as signed, including App Store products, can be considered safe. Note, however, that at least one trojan for iOS (not for OS X) was briefly distributed by a developer in Russia through the iTunes App Store. That store is under the same oversight by Apple as the Mac App Store, so the protection shouldn't be considered absolute. App Store products may prompt for access to private data, such as your contacts. Think before granting that access. OS X security is based on user input. Never click anything reflexively.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. Beyond XProtect, Gatekeeper, and MRT, there’s no evidence of any benefit from other automated protection against malware. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    Even signed applications should not be trusted if they do something unexpected, such as asking for permission to access your contacts or your location for no apparent reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use the free software  ClamXav — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    9. The greatest harm done by security software, in my opinion, is in its effect on human behavior. It does little or nothing to protect people from emerging threats, but if they get a false sense of security from it, they may feel free to do things that expose them to higher risk. Nothing can lessen the need for safe computing practices.
    10. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.

Maybe you are looking for

  • F110, is it possible to list the down payments

    Hello All, While running F110 APP is it possible to get the list of all the down payment  request made at the time of creating the proposal? If it is possible how? Thank you in advance for the reply Regards Arun.R

  • Variable Costs using SKF in Indirect Activity Allocation

    Hello I am trying to use indirect activity allocations and KSPI to transfer costs from an activity in an indirect cost center to multiple direct cost centers. The Receiver tracing factor is planned SKF (i.e. number of employees). The issue I have is

  • Use of prepareSession() in Model layer

    All, In my Jdev 11gR1 application i want to know the use of prepareSession(). My use case is : Currently i am storing a lot of values in the session (View layer using HTTP, and Model layer using userData Map populated from my custom method). Now my q

  • Import NSF Files to Exchange Mailbox without a Domino Server?

    I am trying to migrate NSF Files into an Exchange Mailbox for eDiscovery. Is there a way to import the NSF files into Exchange using the Microsoft Transporter ? any help appreciated!

  • Error in conversion exit CONVERSION_EXIT_CUNIT_INPUT

    Dear all I got the following error " Error in conversion exit CONVERSION_EXIT_CUNIT_INPUT " This is an original sample data. ~ CUST007,SREP07,MAT008,3,DZ,1,,19990424 CUST008,SREP08,MAT008,3,DZ,2,,19980328 CUST008,SREP08,MAT009,2,CS,3,,19980203 CUST00