Question about security

I tested my computer for spyware at this website. http://www.auditmypc.com . The test results said that my computer is not as secure as it should be because the security test was able to detect information about my computer, and that it needed to be updated with a security patch. The test results are posted below this paragraph.
[Quote]The majority of information you will see is made possible, not because of spyware, but because you are missing a security patch or do not have a patch management program.
Your IP Address 64******* 
Your Notice! Your Private IP is ********* and unlike your
external IP of ********* this should be hidden!
Patch software found here & see our Internal IP page. 
The Referring Site is http://www.auditmypc.com/ 
Your Browser is Safari on Mac 
Java Enabled = Yes .
Free Spyware Removal instructions will appear below if spyware is found:
Below is the Raw Data that you give away every time you visit a web site.
REMOTEADDR=******************
REMOTE_HOST=******************
REMOTE_USER=
HTTP_USERAGENT=Mozilla/5.0 (Macintosh; U; Intel Mac OS X; en) AppleWebKit/417.9 (KHTML, like Gecko) Safari/417.9.2
HTTPX_FORWARDED_FOR=
HTTP_REFERRER=
HTTPREFERER=http://www.auditmypc.com/Name adl*****8[/Quote]
Is there a way (maybe via command terminal) to disable Macintosh computers from displaying information about the kind of operating system that I am using - web browser- IP address and so on without compromising system performance ? I am guessing that the best way to disable Un secure browsing would be to open the command terminal and use a Apple script or some type of code that would disable my IP address and everything else from being displayed on websites etc etc. I have tried using Safari’s built in private browsing feature but that method is like using an old proxy number, because when I use it, the computer crashes and lags so I am hoping that there is another alternative. Any advice about how to fix this problem would be appreciated.

Just one more thing. If you are worried about anybody getting access to your computer etc. Make sure you have a router and also turn on the MAC Firewall.
To turn on firewall protection on your computer:
Open System Preferences and click Sharing.
Click Firewall, and then click Start.
To block incoming traffic on ports used by one of the sharing services, disable that service in the Services pane.
You can't edit the firewall ports used by built-in services. They are enabled and disabled automatically when you turn the corresponding service on or off in the Services pane.
If you use iChat Bonjour, iTunes Music Sharing, or iPhoto Bonjour Sharing, make sure to allow those services in and out of your firewall. Turn on their services on the Firewall pane of Sharing preferences.
You should also block UDP traffic and enable Stealth Mode under advanced settings.
To set advanced firewall options:
Open System Preferences and click Sharing.
Click Firewall, and then click Advanced.
In addition to the firewall services in Sharing preferences, you can set additional, advanced firewall settings to further protect your computer. The advanced firewall features include:
Blocking UDP traffic UDP (User Datagram Protocol) is a communications protocol that offers a limited amount of service when messages are exchanged between computers in a network that uses the Internet Protocol (IP). Like the Transmission Control Protocol, UDP uses the Internet Protocol to actually get a data unit (called a datagram) from one computer to another. Unlike TCP, UDP does not provide the service of dividing a message into packets (datagrams) and reassembling it at the other end. UDP is transaction oriented, and delivery and duplicate protection are not guaranteed. Blocking UDP traffic can help secure your computer.
Using firewall logging A firewall log is a record of the your computer's activity and the data traffic into and out of your computer through a firewall. Keeping a firewall log can be helpful if you are tracking where the data is coming from and where it is going.
Stealth mode When you enable stealth mode, all uninvited data traffic receives no response from your computer. Stealth mode virtually hides your computer behind your firewall, and other computers sending traffic to your computer receive no information about your computer.
However, as I mentioned before your browser info will always be out there.

Similar Messages

  • Question about security issues regarding 'cp' and 'mv'

    Ok, I wondered about how 'cp' and 'mv' are really working. I have some guesses but I need these things to be confirmed.
    Here is what I have:
    A partition with a unix file system, say ext2 or 3 (does this make a difference here?) containing *very* sensitive data. The filesystem is encrypted (whirlpool/serpent) but that shouldn't matter. As I do not want corpses of dead files lying around that could be recovered, I always use 'shred -zu' with 26 passes to overwrite and then delete the data.
    And that's where I have my conceirns:
    If I want to rename a file or move it to another folder on the same partition. Is it save to 'mv' it? Or should I 'cp' it and then 'shred' the original file. I assume that 'mv' will not touch the actual file and just tell the file system of it's new name or place in the folder-structure. Given that, shredding a 'mv'ed file should not leave a trace of it on the drive (except of the old filename before the 'mv' maybe, but that wouldn't be too critical). I assume that, because it's the only thing that would make sense to me, but have to know it for sure!
    However, on moving the file to another drive I should probably 'cp' it, then 'shred' the original file. The question I have here is as follows:
    How much information which could be recovered leaves 'cp'ing in my RAM? Will I have to find a way to somehow shred the information in the RAM or can I assume that my RAM get's rewritten often enough, that most traces will be gone, say, in a couple of days?
    If you have links at hand to confirm your answer, please post them, too.

    Okay, thanks for that, I will have a closer look on flushing the ram.
    Sure, I care about security and privacy, but -- as you might expect -- the data I have are not really THAT sensitive/confidential/whatsoever. I've just gotten into it somehow and now I'm just curious/intrested in improving it for it's own sake more or less.

  • Just a question about security

    Hi All.
    Just a simple question really, I read on one of the forums here a question about running windows and apples mac os at the same time.
    My question is: would they not cause conflict, as with apple you don't need to install security but windows is riddled with bugs and virus's surely one would infect the other?
    Sorry to sound so silly,  I'm not very computer savvy , but it strikes me as wrong somehow.
    Thanks Tricia

    You will have whatever threats assail Windows and must protect against those, but none of them will cross over to the Mac side. Note: there is cross platform Windows/Mac malware, i.e. malware written for both. But to be infected you need to be infected directly on the Mac side.
    http://www.zdnet.com/blog/bott/the-slow-and-steady-evolution-of-cross-platform-m alware/4930

  • Question about security issue when transferring files from PC

    I am in the process of looking at macs. I have always been a PC user and have been EXTREMELY impressed with the features of mac os x. Here's the question. I am probably sure that I have one or more viruses on my PC, what PC doesn't right? When I get my mac, I'm looking at the macbook, I see that I can transfer my files over from a PC to my new mac. The problem is. I want my files, but I'm leery about transferring a virus over also. I've heard about the security of macs and I am wondering if this is something I need to be worried about, or if it won't be a problem. Is there any steps I will need to take to ensure that I don't bring any viruses over with my files? Thanks for the help.
    Micah
    P.S. I am really starting to get sick and tired of Vista. I had to download VLC media player to play my Windows Media files because my Windows Media player on Vista WILL NOT play the files meant for that system. Arrrghhh Sorry for the vent.

    Be sure to scan all your files for viruses before moving them from the PC to the Mac. Although PC viruses should have no effect on a Mac, it's still possible to pass on a virus to a friend via email.
    Do You Need Anti-Virus Protection for Your Mac?
    According to Rich Mogull's article, Should Mac Users Run Antivirus Software?,
    "The reality is that today the Mac platform is relatively safe. There are hundreds of thousands of viruses and other malicious software programs floating around for Windows, but less than 200 are known to target the Mac, and many of those are aimed at versions of the Mac OS prior to Mac OS X (and thus have no effect on a modern Mac).
    It's not that Mac OS X is inherently more secure against viruses than current versions of Windows (although it was clearly more secure than Windows prior to XP SP2); the numerous vulnerabilities reported and patched in recent years are just as exploitable as their Windows equivalents. But most security experts agree that malicious software these days is driven by financial incentives, and it's far more profitable to target the most dominant platform."
    Mr. Mogull is a computer security expert. I recommend reading the entire article as it is quite informative.
    For additional information on viruses, trojans, and spyware visit The XLab FAQs and read the FAQs on viruses and spyware.

  • Question about security context in multithreading environment

    I have a need to make concurrent calls to multiple EJBs in parallel threads. Let's
    say I establish the security context once by creating an InitialContext with given
    security principal and credential. With the security context active, I spawn multiple
    threads from the current thread and in each of those threads I make a call to
    a secure EJB method, which my security principal is allowed to access. My question
    is, will the same security context be established in each of the spawned thread
    so that my EJB calls succeed? For various reasons it's not feasible to login in
    each of the spawned threads, only to login once from the main thread.
    I tried this with WebLogic 6.1sp3 and it seems to work as expected. However, I
    have not been able to find any documentation on how security contexts are propagated
    to spawned threads. All I could find was a statement that when an InitialContext
    is created, the corresponding security context becomes associated with the current
    thread.
    My concern is that even though it works in WebLogic 6.1, it may no longer work
    the same way in WebLogic 7.0 or later. And will it work when the JNDI login mechanism
    is replaced by JAAS? If any WebLogic/security guru out there could give me some
    info on how WebLogic security contexts work in a multithreaded environment, I
    would be much obliged.
    Thanks in advance!
    Minh-Tue Vo

    "Minh-Tue Vo" <[email protected]> wrote in message
    news:[email protected]..
    >
    \> My concern is that even though it works in WebLogic 6.1, it may no longer
    work
    the same way in WebLogic 7.0 or later. And will it work when the JNDIlogin mechanism
    is replaced by JAAS? If any WebLogic/security guru out there could give mesome
    info on how WebLogic security contexts work in a multithreadedenvironment, I
    would be much obliged.
    With the JAAS model, you should be able to get a subject once and then do a
    runas in the spawned threads.

  • HT6170 Question about security questioni

    do you have to call apple or can you do it through there online support to reset your security question since my account was created before they started using rescue email.

    Purple 16 wrote:
    Hi,
    you can try the apple support when i forgot my questions i rang up apple and it didn't take more than 10 minutes for them to fix it.
    Link below to call them or make an appointment.
    https://www.apple.com/au/support/contact/
    Astute of you to work out the OP is in Australia

  • HT5114 Question about Security question

    I  forgot the answers to my security questions. Is there anyway to get around it or be sent a reminder or something?

    appleid.apple.com
    Under Passwords and Security there may be a reset option under your questions if you've forgotten them.
    Write the next ones down

  • Question about : Securing Networks with ASA Foundation (SNAF)

    Dear All,
    I would like to ask about the exam Securing Networks with ASA Foundation (SNAF) as below:
    1- How i can download documents before i take exam? ( i mean did it have offline file?)
    2- i was pass CCNA and CCDA already so can i continuous to take this exam?
    I try to find ebook and offline file from Cisco website but it don't have....
    Please let me know if you know this ...:)
    best regards,
    Rechard

    There's a quick reference book for SNAF. You can find it on the cisco press website. There's also an older book called "Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance". It's from 2005 but it's usefull.
    After CCNA I'd recommend you to pass CCNA:Security before you take SNAF. It's needed both for ASA Specialist and for CCSP.
    Good luck

  • Hi, Question about secure empty trash. I moved some Time Machine backup files to the trash from an external hard drive. Now I can't secure empty trash. It starts, finds 74,003 files, and does nothing. The external hard drive shows it's empty, but it isn't

    I moved some time machine backup files from an external USB hard drive to the trash. Tried secure empty trash. It counts 74,003 items, then just sits there. The external hard drive window shows it's empty, but the info pane says it only has 50G of memory left. I left the secure empty trash on over night. It did nothing. Ideas?
    Thanks,
    Ron

    Relaunch the Finder, then from the Finder menu bar, select
    Finder ▹ Preferences ▹ Advanced
    and uncheck the box marked Empty Trash securely. Try again to empty the Trash.

  • Question about security in web browsers

    What are the security limitations of an applet in a Web browser? Is there any way to get around them? plz just give me a straight answer, none of this stupid link bs.

    What are the security limitations of an applet in a
    Web browser? Is there any way to get around them? plz
    just give me a straight answer, none of this stupid
    link bs.
    FAQ - Applet Security
    Java Glossary : signed Applets
    Signed Applets, Browsers, and File Access
    JDK 1.2 - Signed Applet Example

  • Question about security understandig

    hello community,
    I have inserted in the deployment descriptor for the application (weblogic-applicaiton.xml) a security-tag mapping the roles in the application.xml to the weblogic specific users/groups.
    do I need to insert such a block in the other deployment descriptors (those in each WAR, JAR) ? or is it enough having them written in the weblogic-application.xml deployment descriptor?
    thanks,
    maik

    farphel wrote:Looks like the page you link to is incorrect.  If you follow the link from the Arch package and follow the downloading link (http://ftp.gnu.org/gnu/automake/), you'll see that 1.8.3 came out on 07-Mar-2004.
    now this is ridiculous (that the gnu actual homepage should be wrong), but hm... - it certainly looks like it... oh well. thanks!

  • Question about security application

    Hi, I have to develop an application with control access. I mean, it has to be an app with login/password access, one for administrator( with access to changes in database) and other for normal users.
    My question is, what library from the JDK should I use for this?. And...Do you know of any example that can help me to do this?( I know this question can bother you, but I dont want anyone to do my job, please, believe me, I only want an example for advising). And last, sorry for my English because I�m Spanish.
    Thanks to all for your help

    Ok, I�ve thougt of doing it stroring the loging user
    and password in some strings and controlling the
    access of the users in the interface. For example,
    for normal user disabling acces to database in the
    GUI. Could it be correct in this way?.You probably need to implement something usually called a controller (google on that, it common in the MVC concept). The controller should handle the user. You menu items should be configured so that they are enabled / disabled depending on the user. Swing has a class called Action that can be placed on many different components. It's usually used when you have the same option in several menus / buttons etc.
    >
    But I need to hide password when writing it (with
    asterisks). Some help?JPasswordField

  • Lots of questions about security

    I was a pc user for years and got myself 2 brand new tiger system mac- desk top and lap top, in june of this year. i did not know that unlike pc there is no history of when a document is looked viewed past the last time (unless some one out there knows any better). i was friends with a person who i let use both my desk and lap top with out any security on it or separate accounts, basically giving her access to all my info and admin. i suspect that she looked at some private stuff but cant prove it because i opened the documents that i suspected she looked at, hence erasing the prior date and time. since then i got Terminal, logkext, a separate accounts for guests and a code on my own account. for various reasons i stopped being friends with this person- she was creepy- and she started to stalk me and the cops had to get involved and all that horrible stuff.....is there any way i can find out if, when she had access before the codes, she placed any spy ware on my computer without disrupting Terminal and logkext? i know that there are spyware programs out there that can be downloaded and not seen in the applications windows. what is Support-LogMeInRescue.exe? its on my desktop and i cant open it. what is System Profiler? what should i look out for and where should i start looking? better safe than sorry.

    Your saying you let another person use your account. So, they became you as far as the computer was concerned. Now, you want to distinguish between you and you?
    There is recent items. Apple > recent items. Of course, it is a short list.
    i did not know that unlike pc there is no history of when a document is looked viewed past the last time (unless some one out there knows any better).
    What Windows facility are you referring to? I'm not aware of this beyond a short global history list.
    You will want to look into a firmware password.
    http://docs.info.apple.com/article.html?artnum=106482
    Without a firmware password, anyone with physical access to your machine can boot into single user mode or target disk mode.
    This page will tell you how to get into single user mode.
    http://www.securemac.com/macosxsingleuser.php
    Basically, you hold down the command-s key when powering on. The command key has a little apple symbol on the lower left. It is between the alt/option key and the space bar. On a PC keyboard, it will be the windows key, I think.
    Robert

  • Questions about securing a file to prevent printing

    I need to prevent users from printing a file, and I tried to set up a password under Windows and got a message "Use of non-FIPS cryptology is not permitted while in FIPS mode." I was able to add the password on a Mac and it did the job (prevented printing on Mac and Windows), but I remember coming across a problem a few years ago with a password-protected file for a client (I may have enabled the FIPS mode on this computer at that time to check that file). I don't remember exactly what the problem was at that time; it was an editable form and I'm assuming that the problem was that the file could not be saved once the data was entered into the file.
    My current document will not have any editable fields, and I just wanted to check to see if there could be any potential problems with using password security in case this client has FIPS mode enabled.

    In Acrobat Pro 9, select Advanced > Security > Encrypt With Password.  At the bottom of that screen you can restrict printing.

  • HT201303 hi just got my new apple ipod touch i need to update my security information other wise it wont let me download apps it says to enter three questions about myself and i get to the third question and it wont let me enter the third question

    hi just got my new apple ipod touch and to download apps it wants to add questions about myself for more sercurity information. i get up to question 3 and it wont let me select a question but it will let me write an answer so i just pressed done and then it says i cant carry on because ive mised out information when it wont let me do a question!

    Welcome to the Apple community.
    You might try to see if you can change your security questions. Start here, change your country if necessary and go to manage your account > Password and Security.
    I'm able to do this, others say they need to input answers to their current security questions in order to make changes, I'm inclined to think its worth a try, you don't have anything to lose.
    If that doesn't help you might try contacting Apple through Express Lane (select your country, navigate to iCloud help and enter the serial number of one of your devices)

Maybe you are looking for

  • Unable to download SAP Business One 8.8

    Hi All, We were in the process of trying SAP Business One 8.8. Unfortunately I have not been able to download the trial software. My S User ID also happens to be the super administrator. Please do let me know if there is an alternate link to download

  • Leopard 10.5.8 won't boot

    Here's is a mindbender for you to ponder: Had a power outage. My hopped up G4 tower with 2 - 200 GB EIDE drives on an EIDE PCI card.  It crashed and one 200 GB EIDE drive didn't survive. (Yes it was on a UPS but the UPS ran dry and the G4 crashed bef

  • Anyone using two external LCD with a recent MacBook Pro?

    Hello, Does Thunderbolt support chaining multiple monitors(e.g. non Apple Thunderbolt Display) to a MacBook Pro? A Thunderbolt hub will be required, some external HD have two TunderBolt ports.  A device with three ports will be required (one input, t

  • [svn] 3229: Made some updates to the config test framework.

    Revision: 3229 Author: [email protected] Date: 2008-09-16 12:15:34 -0700 (Tue, 16 Sep 2008) Log Message: Made some updates to the config test framework. This should be able to run on all the regression boxes now assuming I got the names of all the lo

  • Testing Oracle10g RAC

    Hi, I want to test Oracle rac availability and load balancing. Does anyone know some useful document, link or have an idea how to simulate failover? Thanks