How do I check and clean of virus's

How would I check and clean my Mac of virus's?

1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files. This feature is transparent to the user, but internally Apple calls it "XProtect." The recognition database is automatically updated once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders. In most cases, there’s no benefit from any other automated protection against malware.
The following caveats apply to XProtect:
It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets (see below.)
It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
3. Starting with OS X 10.7.5, there has been another layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't actually been tested by Apple (unless it comes from the Mac App Store), but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. For most practical purposes, applications recognized by Gatekeeper as signed can be considered safe.
Gatekeeper has, however, the same limitations as XProtect, and in addition the following:
It can easily be disabled or overridden by the user.
A malware attacker could conceivably get control of a code-signing certificate under false pretenses (though there's no evidence this has happened yet.) The certificate would eventually be revoked, but probably not before some damage was done.
For more information about Gatekeeper, see this Apple Support article. 4. Considering all the above, the best defense against malware is your own intelligence. All known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. If you're smarter than the malware attacker thinks you are, you won't be duped. That means, primarily, that you never install software from an untrustworthy source. How do you know whether a source is trustworthy?
Any website that prompts you to install a “codec,” “plug-in,” or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn users who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
“Cracked” copies of commercial software downloaded from a bittorrent are likely to be infected.
Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. No intermediary is acceptable.
5. Java on the network (not to be confused with JavaScript, to which it's not related) is a weak point in the security of any operating system. If a Java web plugin is not installed, don't install one unless you really need it. If it is installed, you should disable it (not JavaScript) in your web browsers. Few websites have Java content nowadays, so you won’t be missing much. This setting is mandatory in OS X 10.5.8 or earlier, because Java in those obsolete versions has known security flaws that make it unsafe to use on the Internet. The flaws will never be fixed. Regardless of version, experience has shown that Java can never be fully trusted, even if no vulnerabilities are publicly known at the moment.
Follow these guidelines, and you’ll be as safe from malware as you can reasonably be.
6. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good. If you need to be able to detect Windows malware in your files, use the free software ClamXav — nothing else.
Why shouldn't you use commercial "anti-virus" products?
Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
In order to meet that nonexistent threat, the software duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability and poor performance.
By modifying the system, the software itself may create weaknesses that could be exploited by malware attackers.
7. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so can corrupt the Mail database. The messages should be deleted from within the Mail application.
ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. If you don't need to do that, avoid it. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
8. The greatest danger posed by anti-virus software, in my opinion, is its effect on human behavior. When people install such software, which does little or nothing to protect them from emerging threats, they get a false sense of security from it, and then they may do things that make them more vulnerable. Nothing can lessen the need for safe computing practices.
9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use.

Similar Messages

  • How do I check and clear malware from my Mac book Pro 10.6?

    How do I check and clear malware from my Mac book Pro OS x 10.6?

    Helpful Links Regarding Flashback Trojan and Virus Protection
    An excellent link to read is Tom Reed's Mac Malware Guide.
    A link to a great User Tip about the trojan: Flashback Trojan User Tip.
    To check for the trojan: Anti Flashback Trojan 2.0.4.
    A Google search can reveal a variety of alternatives on how the remove the trojan should your computer get infected. This can get you started. Or the preferred method is to use Apple's protection tool: Flashback Malware Removal Tool 1.0.
    Or, open Software Update. If you do not have the Apple protection software installed it will download and install it via Software Update. If no update appears that means you either already have it installed or it isn't needed for your system. The software is only available for Leopard, Snow Leopard, and Lion versions of OS X.
    Also see Apple's article About Flashback malware.
    For general anti-virus protection I only recommend using ClamXav.
    For the DNS Changer malware see the following:
    Will your internet service cut off on July 9?
    DCWG | DNS Changer Working Group
    How to remove the DNS Changer malware

  • Control-k key binding broken. How can I check and change my key bindings?

    I use the Terminal app a lot. Unfortunately I am not able to use the control-k shortcut to cut lines in the terminal anymore. How can I check (and change) the Terminal key bindings?
    Thank you!

    Basing on your input, you should get the following values:
    1) session keys
    SK_ENC: 6DCE2A99BACB5207A7A96A92F114D66C
    SK_MAC: 0D446132B168F75CD6F0A780693A4DD3
    SK_DEK: 19F7B0F94837F32874B29B5EFB7809F6
    2) host cryptogram
    1B781553209748EA
    3) Retail MAC
    01761103B810F00E
    Summing up, the External Authenticate command should have the following value:  84 82 01 00 10 1B781553209748EA 01761103B810F00E.
    Try to compare it with your results.
    Regards

  • How can I check and change the size of photo or doc in iPhone or any other app

    How can I check and change the size of photo or doc in iPhone or any other app

    You would need software form a third party to have this option.  The free software that comes with the 8600 doesn't have an option for that. Vuescan is the only software I could find that says it works with your pritner and has a descreen option.  You have to purchase it, but it will give you more advanced options than the software that came with the printer.
    -------------How do I give Kudos? | How do I mark a post as Solved? --------------------------------------------------------

  • How does Avilability check and TOR  takes place in SD

    How does Avilability check and TOR  takes place in SD? if you have any Tax configuration notes please send it to my mail ID?
    [email protected]
    Gopal

    ATP
    Types of Availability Check in Sales and Distribution
    Processing
    There are three types of availability check:
    _ Check on the basis of the ATP quantities
    _ Check against product allocation
    _ Check against planning
    The following SD-specific control features need to be maintained in Customizing:
    _ Checking group
    The checking group controls whether the system is to create individual or collective
    requirements in sales and shipping processing. In addition, a material block for the
    availability check with transfer of requirements can be set here. The checking group can
    also be used to deactivate the availability check. This option was created especially for
    the assembly order so that when the bill of material is exploded in the assembly order,
    the individual components, if necessary, can be classified as non-critical parts as far as
    procurement is concerned.
    The checking group specifies in combination with the checking rule the scope of the
    availability check. It is proposed in the material master record on the basis of the material
    type and the plant, and copied into the sales and distribution documents.
    _ Checking Rule
    You use the checking rule to control the scope of the availability check for each
    transaction in sales and distribution. You also specify whether the check should be
    carried out including or excluding replenishment lead time. The individual checking rules
    define by transaction, which stock and inward and outward movement of goods should
    be taken into account for the availability check.
    _ Schedule line category
    You can control with the schedule line category whether an availability check and
    transfer of requirements should be carried out in the sales documents. The possible
    settings for this at schedule line level are dependent on the settings in the requirements
    class which is determined from the requirements type of the material.
    _ Delivery item category
    The delivery item category can be used to control whether an availability check takes
    place in deliveries.
    Requirements type
    The various requirements are identified by their requirements type. The requirements
    type refers to the requirements class and its control features.
    _ Requirements Class
    The requirements class contains all control features for planning such as relevance for
    planning, requirements planning strategy and requirements consumption strategy. In
    addition, it is specified at a global level whether an availability check is to take place for
    the material in the sales and distribution documents on the basis of the ATP quantity
    (ATP = available to promise) and whether requirements are to be passed on. A finer
    degree of control can be obtained for sales documents using the schedule line category.
    Replenishment lead time is only included in the check performed on the basis of the
    ATP quantity.
    Prerequisites
    An availability check can only be carried out if the following prerequisites have been fulfilled:
    _ The control elements described above for the availability check must be maintained in
    Customizing for Sales and the relevant assignments made to the sales transactions
    _ The availability check must be switched on at requirements class level and - for the
    availability check in the sales documents - at schedule line category level
    A requirements type must exist by which the requirements class can be found
    _ A plant must be defined. It can either be proposed from the customer or material master
    record or can be entered manually in the document.
    _ A checking group must be defined in the material master record on the Sales/plant data
    screen in the Availability check field
    Configuring entries of the Availability Check
    IMGSDBasic fncsAvailability check and TORAvailability checkAvailability check with ATP logic or against planningDefine checking groups
    You can use SAP std checking groups of 01 for summarized reqts or 02 for daily reqts or u can create ur own.
    The columns total sales and total deliveries are selection options whereby u can configure a checking rule to sum up reqts to post to MRP either individually or by day or week.
    Column 5, Block qty; set this block if u want several users to be able to process the material simultaneously in different transactions without blocking each other. The No Check indicator is used when u want a material to not be relevant for an ATP check.
    Defining a material block for other users. The Block checkbox is an indicator that enables u to block the particular material from being checked for availability if it is already being checked at the same time by another user.
    Defining the default value for checking groups. However should no entry exist for the checking group in the material master record, one can set a default value per material type and plant.
    Controlling the availability check. In this section, u tell the system what stock on hand and what inward and outward movements of stock it must take into account when performing the availability check. These settings are based on the checking group that is assigned to the material master record and the checking rule that is predefined and assigned to the sd transaction. The carry out control for the availability check must be maintained for both the sales order and delivery.
    TOR
    IMG  SD  Basic fncs  Availability check and TOR  TOR
    A line item in the sales order creates a schedule line. The schedule lines in the sales order transfer the requirements through to MRP. You can select the docs on which you want the TOR to happen. For ex, not for quotations.
    The TOR aims to ensure the ordered materials are available for the requested delivery date. The TOR can be set for individual or for collective requirements (materials mastersales/plant view).
    The TOR is dependent on the following data:
    The reqts type, reqts class, checking group and schedule line category.
    The reqts type and class are determined in the strategy group (material masterMRP3)
    For TOR to be carried out, a few criteria need to be met:
    Plant assigned to line item level, schedule line category should be switched on at TOR, TOR must be switched on at the reqts class level, checking group must be defined and allocated to the material master record (sales/plant view in the availability check field)
    The reqts class is the controlling factor for the availability check and the TOR for all sd types.
    Configuring the TOR:
    1) Use std 041 reqts class or copy and rename it. Use the indicators to select if this reqts class must carry out an availability check and/or a TOR.
    2) Define the reqts types. A reqts type is allocated to a single reqts class and not vice versa. It is based on the item category and the MRP type of the material.
    3) Assign the rqts type to the relevant item category in the sales order and the MRP type found on the material master record.
    You can select an alternative search strategy where u assign the reqts type to item category and MRP type. Can select source as 0, 1 or 2. (1 = Item type and MRP type strategy).
    4) The TOR and Availability check can be selected/de-selected at the schedule line category level.
    5) Block qty confirmation in delivery blocks. This is used to block the reservation of the TOR from MRP.
    6) Maintain requirements for TOR. Requirements can be used to determine that the TOR to MRP is not carried out unless a number of conditions are met.
    Availability Overview = CO09  order qty, sd doc no, item no, requirements class.
    Stock requirements list = MD04  sd no or dly no, line item, schedule line placing the demand
    Stock overview = MMBE  total stock per company, then plant followed by storage location, and finally a breakdown per batch
    this is the customising as weel as the knowledge part.
    PLease award pints if helpful
    thanks

  • How can I check and see that my photos are being backed up by time machine?

    How can I check and see that my photos are being backed up by time machine?

    http://pondini.org/TM/8.html

  • How do I check and uncheck music

    How do I check and uncheck my music in iTunes. I opened my computer and all the music was unchecked. Is there a way I can check them all at once?

    Hold down the CMD key and click a check box. That will re-enable all your songs.

  • How do i delete and clean my iMac so i can give it to my sister?

    I need to delete files and clean them so i can give my imac to my sister.  want to keep the operting system

    These articles and webpages explain how to restore the Mac to it's factory condition before selling of giving away:
    What to do before selling or giving away your Mac
    Selling your old Mac? Prepare it first - CNET
    Preparing an old Mac for sale | Macworld
    OT

  • How do I fully and cleanly uninstall unwanted apps?

    Have recently swapped from a Windows machine to a brand new and customised iMac. I've therefore had to accept that the OS is Mavericks and that pre-loaded on the machine are iPhoto and the iWork suite. I now wish to remove, if permitted, the following of these from the machine:
    iPhoto
    Keynote
    Numbers
    Games
    How can I do this fully and cleanly? I gather that you can do a 'shake' test for an app you want to delete from the machine and, if it's permitted to remove the app, you then drag its icon on to the Trash. But as I understand it this doesn't necessarily remove other extraneous files associated with the app. So, how do I discover what those are, where they're located, and what exactly to do with them?
    Incidentally, of the iWork suite I've decided to keep Pages.
    I'm a little concerned that perhaps uninstalling these apps might remove some files that are shared with other apps on the machine, including functions built into the operating system. Will that conceivably happen? Is iPhoto, for example, required to display images in Apple Mail, and is it also required for me to be able to import RAW and other images from a camera using direct drag 'n drop (into a folder of my own choosing)? And what about Preview? Will that get removed along with iPhoto?
    I only do serious work on my computer, and I want to keep this machine's contents lean and clean.

    Barney and Tony,
    Not sure if this reply will appear in the correct sequence in the discussion thread but I've had a look at those folders and files you mentioned, Barney. There was nothing in most of them. Library/Extensions exists as System/Library on my setup but I saw nothing in it pertaining to any of the three apps concerned.
    In <System>/Applications/Numbers/Contents I found such cryptic folders as:
    _Code Signature
    _MAS Receipt
    info.plist
    MAC OS
    Pkg info
    etc
    but, again, looking in these folders yielded nothing that appeared remotely associated with any of the three apps. In searches like this you can get right down to the very coding level if you wish, it seems. However, unless you're familiar with the coding you've no idea as to what these functions are, or how they interact with other apps and processes. And I'm certainly not.
    One thing I did come across, however, happened when I was looking at one of the more hidden-away user functions of the Apple Mail client and I noticed that apps such as iPhoto and PhotoBooth are involved in importing images into the client. That being so, it might be better for me not to remove iPhoto, since I use and rely on Apple Mail quite a lot.
    All in all, it's difficult for me to make an informed judgement on this. Possibly, Apple's now organised the uninstall of certain apps in a much fuller and cleaner way than before and so perhaps all I'd need to do, in reality, is to perform the 'wiggle' uninstall. But I just don't know. And there's always the danger that removing what are now some quite embedded apps could cause some other related app or utility to not function properly from hereon. So, in the end, I might have to just concede that I'm stuck with these apps.
    Possibly, the only way of ridding my machine of them is for me to perform at a later date a major cleanup, completely wiping the HD, and reinstalling Mavericks from scratch.
    If only Apple had never installed those apps in the first place! Why on earth did they have to be compulsory?! So much for Apple and their products being user-friendly! I'm disappointed in Apple over this.

  • How do I check and change PHP environment?

    Folks, I just installed Snow Leopard server and am having trouble getting things (that used php and GD library such as JetPhoto server) up and running. I could install MAMP I suppose, but don't want to override the features of Snow Leopard Server.
    Is PHP installed with SL Server?
    How do I check the PHP environment?
    How do I enable GD library and enable registerlongarrays?

    I've never viewed a php config except by using come cgi script or maybe it was . I have never used terminal to view or config php, but am not opposed to it either.
    To confirm php is configured and launched (see below), launch Terminal.app, and cut-and-paste this into the terminal:
    sudo echo "<?php phpinfo(); ?>" > /library/webserver/documents/somerandomname.php
    sudo chmod o+r /library/webserver/documents/somerandomname.php
    you'll have to enter your root password there. Those two bash shell commands stuff some text into a file named somerandomname.php in the web server root directory, and marks the file as world-readable.
    The text is a simple php script that returns information on php.
    Now (from a web browser running directly on the server) enter the URL:
    http://localhost/somerandomname.php
    If it is all working, you'll get the typical dump of php settings. This is what the dashboards show you.
    When you are done (and to avoid exposing information) you'll probably want to delete the file:
    sudo rm /library/webserver/documents/somerandomname.php
    I am used to editing a php.ini file in textwrangler or bbedit, or even my web service provider's control panel.
    You've signed up to run a server, which means you're going to get to learn more about Apache and IP networking and other tasks.
    Nothing using php seems to load. When I installed jetphoto server which I'e used for years with out problem on OS X client, it runs flawlessly. It seems I have to do more with SL server.
    Make sure that Server Admin has the php module enabled. Server Admin > select the server > Web Server > Settings > Modules > make sure php5_module is enabled. If not, enable it and restart the web server.
    One other detail that can crop up here: Snow Leopard and Snow Leopard Server contain php 5.3, and some widgets aren't yet compatible with that version of php.

  • How can I check and change the system set events trace level?

    Dear all:
    How can I check the system set events trace level? I don't want the alert_log so big.
    Regards
    Terry

    Hi Terry;
    Please check :
    How to determine which system events are currently being set? [ID 845043.1]
    How To List All The Named Events Set For A Database [ID 436036.1]
    How to set EVENTS in the SPFILE [ID 160178.1]
    Also check:
    http://www.dba-oracle.com/t_grid_rac_events_in_Oracle.htm
    http://www.akadia.com/services/ora_events.html
    Hope it helps
    Regard
    Helios

  • How can I check and see if someone is tracking online activity on my IPad 3 from their device?

    How can I check to see if someone is tracking or accessing my Internet activity on my Ipad3 from a separate location?

    You can't. Make sure you have security/firewall set on your router. If you are using your iPad in a free wifi location (ie like Starbucks) it's possible for someone to intercept your wifi activity.
     Cheers, Tom

  • How do I diagnose and remove iPhone viruses?

    I think my iPhone (iOS8) has a virus.  There is a noticeable decrease in the battery life.  Also, the Lifelock app popped up, giving a warning.
    I tried downloading Avira (I use it on laptop), but it apparently isn't available.
    I need something that will scan, diagnose and remove the virus(es).  Any suggestions?

    The only possible ways to get a virus are:
    -Jailbreak
    -Downloading an app that is not from the App Store.
    Other than that, your iPhone is fine.
    -Ethan

  • How can I darken and clean up this logo?

    I drew this image and scanned it, and as you can tell the lines are very light and not precise. This is my original image:
    I'd like to digitiliaze this image and make it more professional and clean. I've tried image trace in illustator and many adjustments in photoshop. Here is my result:
    Much better than what i started with but still not professional and clean enough for branding. SOMEONE PLEASE HELP!!

    +1 to the Pen Tool.
    Once you have the logo as a well-drawn path, you can manipulate it easily.
    When you're drawing with the pen, try to create a minimum of points, and adjust the bezier handles to get your curves to align with your artwork fairly well.  Then once you've drawn the paths, you can turn the whole thing into a shape layer as described above, disable the artwork layer, then fine-tune it to look really good.
    Use the Control key while adding points with the path tool to move them around to fine tune things.   If you click in the wrong place, use the History to go back to redo one or more steps.
    Once you have the path just as you want it, you can turn it into some pretty amazing stuff...  Here's a 3D extrusion of the path, for example.
    Since I quickly drew the path to illustrate the above, I might as well provide you with a copy.  Click on the path with the direct selection tool to examine the points and bezier handles to get an idea of where I put them.
    After you practice with the pen for a while it will become natural to you, and you'll find you can almost magically match drawn curves.
    Have fun!
    http://Noel.ProDigitalSoftware.com/ForumPosts/RowdyPath.psd
    -Noel

  • How do i check and see what is using up all my harddrive space

    How do i check to see what is using all of my hard drive space?

    I would try OmniDiskSweeper.
    Matt

Maybe you are looking for

  • N8 - Service is unavailable

    Hello, I'm using N8. I'm trying to update my Nokia Belle using my computer but still cannot. I'm using Nokia Suite 3.3.89. When I try to update, the message is 'Service is unavailable'. May I know why this happen...?

  • SSHR - MSS ICD (Individual comp Distr) if chained in Hire workflow commits

    hello - I have inlcuded the ICD(Individual Compensation Distribution) workflow function inside the seeded Hire workflow processes. the seeded sequence is - Emp Details > Asg Details > Pay Rate > Change Manager > Review I have customized it to - Emp D

  • Paging Memory ... and JAVA!

    Hi all!.. My problem: get 200.000.000 of double elements (i have a matrix) following my calculates, i need 1.8 Gb of ram memory.. i have only 1 Gb. now... how can i manipulate large set of data?? can i use paging memory?... and before... can java use

  • Security Issues with Time Capsule Especially now on MobileMe

    Hi there, I connect my cable modem directly to my Time Capsule WAN port. My TC creates a closed wireIess network using DHCP that is secured with WPA2. I then connect my Macbook to this via Ethernet and/or Airport. I set my Time Capsule to share a pub

  • Rearrangement in JTree

    Hi , My requirement is something like this. I have a tree (JTree) and there are some nodes by default in it. I should be able to rearrange the nodes using drag and drop. ie., i have a root node, and inside it i have 3 nodes test1,2 and test3 as show