Setups for Security

Three questions here. My iMac sits at home. No one else has access to it. And I am retired. Please tell me about these options in the Security Preferences screen.
Firewall. Does the average person need this activated?
Firevault. Is this necessary for all?
I don't have the Missing Manual for Mavericks yet. So I often look up topics in the MM for Lion. He mentions something on page 510 about "closing the backdoor" so hackers can't 'Ping" an idle or sleeping computer. The Security Preferences in Mavericks don't seem to address this. Has the new OS got built-in security for this.
Wiping an HD clean, installing fresh OS and then restoring preferences from a TImeMachine backup.
I was getting some odd behavior on my HD that DiskWarrior detected. From the error messages, the Alsoft (DW company) support people suggested I erase the HD and install a new system. And to be sure, wipe the HD clean first. I posted about this before, and the kind people on this forum agreed. I wonder, though, would it be save to Restore my old Network and Kechains and System Preferences from my TM backup?

I'll weigh in on this:
1. You don't need a firewall if you use a hardware router with its own built-in firewall.
2. You have no real need for FileVault unless you require military level security.
3. Do have a strong log-in password for your Admin account. Be sure to write it down somewhere safe.
4. Be sure you use strong passwords for any sites you use that require logins; especially ones where you purchase things.
5. Don't do your banking online or pay bills online. These places have security systems too easily cracked.
6. Use a credit card as infrequently as possible. Your financial information is not available on cash.
7. If you are behind a good router you should not have problems with hackers. If you use wireless, then be sure to activate security in the router to prevent others from accessing your network.
8. Pinging your backdoor can be blocked by using the firewall, but I don't think you have much to fear here. Only experienced hackers even know what that is. And, who wants your information? Unless you have millions in cash available, hackers aren't interested in you or your bank accounts. I haven't used any of these advanced security setups in 30 plus years of computing - I'm 72 and retired. I don't even both with anti-malware software
9. It's safe to restore your old keychain as long as you know you haven't permitted anything you'd be worried about. Network and system preferences should be no problem.

Similar Messages

  • Aironet 1142N-A-K9 Quick Setup for Security

    Hello All!  We recently purchased this AP for a "quick" proof of concept for Wireless N in our facility.  I purchased the stand alone model in the hopes that it would be a quick setup to test with.  I'm familiar with routing and switching with Cisco however not so much on the security / wireless side.  My goal is to enable the 802.11n radio along with something like WPA2 with a pre-shared key (no radius server etc).  Just something quick that's moderately secured to test with.  Any help would be appreciated, thanks!

    Cisco 802.11n Design and Deployment Guidelines
    http://www.cisco.com/en/US/customer/solutions/collateral/ns340/ns394/ns348/ns767/white_paper_80211n_design_and_deployment_guidelines.html
    Configure 802.11n on the WLC
    http://www.cisco.com/en/US/customer/products/ps6366/products_tech_note09186a0080a3443f.shtml
    Hope this helps.  Don't forget to rate our posts.  Thanks.

  • Configuration/Setup for securing PI messages with certificates

    Hello Experts,
    I'm looking for some guidance/suggestions/direction in regards to installing and using certificates when exchanging data with trading partners via PI 7.0.  It's something new to us and it's been a bit of a struggle.
    In scenario 1, we want to send to, and receive from, xml documents with a partner.  We currently send from our PI system, but want to receive the messages back thru an F5 network (?) which would decrypt the message and pass it along to PI.  This also takes care of load-balancing.
    In scenario 2, we want to exchange EDI messages using the AS2 Adapter from Seeburger.  Again, messages would be sent from PI and received by the F5 network.
    The F5 would act as the SSL termination point (if that's the correct term), and pass the decrypted message to PI via a normal http transfer.
    We are storing our partners' certificates within PI, and configuring the communication channels to use them.  Is this correct?  Do they need to be stored on the F5 as well?  Do we then give them our certificate from the F5, or do they need a certificate from our PI server, or both?
    I guess what I'm looking for is some straight-forward SSL 101 documentation, especially where it applies to middleware like the F5.  Thanks in advance for any help you can give.

    Hi,
    Just a quick note on the certificates; if you want to encrypt messages sent from PI you need the public key of the receiver stored in PI (J2EE key store) with which to encrypt the messages. When receiving files back from partners, they would need to encrypt the messages with the public key of F5 certificate. F5 would then use its private key to decrypt the message before passing to PI.
    So, yes, you are correct to store the certificates of your partners in PI which will be used in encryption of outbound messages. F5 would only need the private keys of the certificate that your partners have encrypted with, no need for PI certificates to be stored in F5 (unless you also need digital signatures).
    Hope this helps.
    Br,
    Kenneth

  • HT5570 Can any one let me know how to setup new security question answers required for purchases of which the previous answers been forgotten.

    I am trying to do some purchases from my account balance of USD 50.00. But not able to do it as I have forgot the answers for security questions. Thus, I have been trying to setup new answers for that, but could not find any way to do so. Please help me on this.

    You need to ask Apple to reset your security questions. To do this, click here and pick a method; if that page doesn't list one for your country or you're unable to call, fill out and submit this form.
    (118301)

  • I want to set up two apple id's (w/facetime)  one for personal use, and one for professional use.   I get the validation email, click the link -and it says it won't work for security/timeout reasons.   failure prevents setup of second account.

    I can set up my personal account just fine.  personal apple id is my [email protected]  - I can setup the ipad and face time no problem.
    But I don't want to be facetime tutoring with my personal account.  I want students to find me by my .edu address
    I cannot complete the second apple Id setup, as the confirmation email always fails.  Even if I disable all firewall/blocking in outlook and windows. 
    I get an error every time.  
    Your request couldn't be completed.
    This may have occurred for security reasons or because your session timed out.
    So much for Apple being the "simpler" PC for users.  
    I've been a Windows user/technician for many years.   I've never seen anything this aggravating.
    Anyone run into this before?

    Saw this in another forum. You could try it.
    Under the FaceTime Account you can only have 1 email set up, but below that you can set up multiple email accounts as phone numbers, I do it all the time.
    FaceTime is set up with my account, but since the iPad is more of a family device (its mine, but everyone is allowed to use it), my sister programed her email so that her friends can call her on the iPad and so did my Mom and brother. Their friends dial their numbers (email addresses) and the iPad still rings even though the main number is mine account.
     Cheers, Tom

  • No icon for security setup

    I have a new Linksys wireless router that I successfully installed yesterday.  It seems to work fine.  But I cannot setup the security because there is no icon in my system tray in the lower right corner of my screen.  There are lots of icons there but no Linksys icons.  I reinstalled the router but still no icon.  I have looked at the entire tray, not just the most used icons.
    Any suggestions?
    Amy

    Amy are you talking about wireless security?
    Try to go to http://www.linksys.com/kb.
    look for answer id 949
    it has explicit intsructions on how to setup wireless security.
    I read this website alot and it teaches you alot of things,
    "Give them nothing... But take from them everything..."
    -Leonidas "300"

  • Setup crypto for secure communication with other switches

    What kind of code can be used to setup crypto for secure communication with other switches.

    ok but is there any special code i need to write if i need to create a crypto secure communication between some particular switches.

  • My browser dowloads everything automatically in MyDocuments. But, for security reasons, I need to setup a different download path, to a different location, where I keep my personal files. How do I change the download path? Thanks, Dan.

    My Firefox 3.6 is setup to download anything automatically in MyDocuments (which I never use).
    For security reasons, I designated a different location on my hard drive, where I keep my confidential files.
    How do I change this downloading path? I tried to change it by going to "Tools-Options-Save Files To", but it does not work.
    Thanks,
    Dan.

    Do you have any extensions that might interfere?<br />
    See [[Troubleshooting extensions and themes]]
    Does it work if you select Tools > Options > General : Downloads : "Always ask me where to save every file" ?
    Your above posted system details show outdated plugin(s) with known security and stability risks.
    # Shockwave Flash 10.0 r42
    # Java Plug-in 1.6.0_03 for Netscape Navigator (DLL Helper)
    Update the [[Java]] plugin to the latest version.
    *http://java.sun.com/javase/downloads/index.jsp (Java Platform: Download JRE)
    Update the [[Managing the Flash plugin|Flash]] plugin to the latest version.
    *http://www.adobe.com/software/flash/about/

  • Ideal setup for a home security lab?

    Hi!!
    I am focussing on getting a home lab setup for practising cisco Security. Can some one suggest me some network devices that i can buy.. I am getting the following
    2 Cisco 1741 Routers
    1 2950 Switch
    2 Cisco 501 PIX
    Do you think I can setup a good with the following equipments?
    Thanks
    Shyam

    Hello,
    The following is listed for the the CCIE Security lab:
    http://www.cisco.com/web/learning/le3/ccie/security/lab_equipment.html
    * Cisco 2600 Series Routers
    * Cisco 3600 Series Routers
    * Cisco 3700 Series Routers
    * Cisco Catalyst 3550 Series Switches
    * Cisco PIX 500 Series Security Appliances
    * Cisco VPN 3000 Series Concentrators
    * Cisco IPS Series 4200 intrusion prevention system sensors
    * Cisco Secure Access Control Server for Windows
    * Certificate Authority Support
    * Cisco ASA 5500 Series Adaptive Security Appliances*
    I would 'aim' for that. Also go in the link and see the relevant code levels you should be working with.
    --Jason

  • Just bought a 3TB Time Capsule for a small office. Will have 4 users with MacBooks. What would ne the best setup for time machine individual backups and internet sharing in a secure way?

    Just bought a 3TB Time Capsule for a small office. Will have 4 users with MacBooks. What would ne the best setup for time machine individual backups and internet sharing in a secure way?

    Set up each Mac for Time Machine backups in the normal way.  Time Machine will keep each backup separate on the Time Capsule, so users will only be able to see the backups of their own Mac.
    Yes....there are convoluted workarounds that might allow one user to see the backups of another.....IF...they know the administrator password of the "other" Mac.
    As far as Internet sharing, all users will have access to the Internet if they have a wired or wireless connection. If a Mac connects using wireless, it is possible to limit the time that they are allowed to connect to the network.
    For example, you might limit the ability to connect to the wireless from say each Weekday from 8 AM to 6 PM.
    With a wired Ethernet connection, you cannot limit access times to the Internet.

  • I am trying to setup to secure a redirect public port to a private port

    I i am trying to setup to secure a redirect public port to a private port to a Microsoft server exchange
    A user coming from the outside(Untrusted security level 0) will connect to IIS server in the DMZ(Trusted security level 50) with a port 443 to a PIX 515 , the IIS server has a application called Detour Service(Service transparently reroutes any TCP connection from one IP Port to any other IP Port) will initiate a connection to Microsoft server exchange to the inside(trusted security level 100).
    Do you think it is the right solution I term of security?yes or no, are do you have a better solutution
    Thanks
    User port destination 443(outside)>>>>>> IIS server port destination 9999(DMZ)>>>>>>>>>>> Microsoft server exchange(inside)

    Actually the connection from lower security level to higher security level is blocked. You can apply an access list to limit traffic from inside to outside, or allow traffic from outside to inside. For transparent firewall mode, you can also apply an EtherType access list to allow non-IP traffic.

  • SSL Certificate setup for Web/Address Book/iCal in 10.7 Lion?

    I know nothing about certificates. I plan to use my Mini server to help manage my family's computers which are pretty spread out across the U.S. My plan is to use profile manager for device management, host a couple websites (one secure for home security cams) and share address books and calendars. This is as much a geek gadget project as it is "useful" so I understand I may be creating some work for myself
    Anyway, can someone walk me through the correct setup for certificates? My research is showing me a LOT of options/parameters. Due to the expense, i don't want to create one just to find it won't serve my purposes.
    Also, I think i'm going with RapidSSL...$50 is the cheapest I've come across...hopefully the offer what I need?

    I have just spent 30 minutes on the phone to a pleseant chap in Athens, and now have a solution.
    We tried several options and the final one worked - so simple.
    Click on the apple symbol > system preferences > iCloud > disable contact sync > keep contacts
    Check search, in my case it worked for the first time in several weeks :-)
    then re-enable contact sync as follows:
    Click on the apple symbol > system preferences > iCloud > re-tick contacts > merge contacts
    Search still works
    Hallelujah!

  • Office 2013 RMS Client Configuration - Your Machine is not setup for IRM

    Hi All,
    I have successfully setup a test AD RMS farm but stuck at trying to configure Office 2013 to work with this. The farm configuration is as below
    DC: Windows 2003 
    AD RMS Server: Windows 2008/ SQL Server 2008 R2
    Client: Windows 7 64 bit with Office 2013 32 bit, Domain Joined
    Client is domain joined and SCP has been successfully registered ( I can see the SCP in AD RMS properties).
    When I open word and select Protect Document -> Restrict Access, the only option is to Connect to RMS Server and get template, which eventually gives an error
    Your Machine isn't setup for Information Rights Management (IRM). To set up IRM, sign in to office, open an existing IRM protected message or document, or contact your help desk.
    Surprisingly, when I open a document protected by IRM (from a different machine), IRM is automatically configured for the user and starts working from that point. However any new domain user login into this client faces the same issue.
    Can anyone help identify the required registry keys that need to be present for getting this working on the client.
    Thanks for your help
    Anuj

    Hi  Manoj,
    To install Microsoft Deployment Agent, you must be a member of the Windows
    Administrators security group on the computer where you will install it. You must also be a member of the
    Release Manager role in Release Management.
    From the log, the user you‘re using seems not in the local administrator group. Please make sure the corresponding users has the needed permissions to install the deployment agent. Please check this
    page for more information about installation of deployment agent. If you have any other issues, please elaborate more details about your scenario.
    Best regards,
    We are trying to better understand customer views on social support experience, so your participation in this interview project would be greatly appreciated if you have time. Thanks for helping make community forums a great place.
    Click
    HERE to participate the survey.

  • How to setup the security based on roles in Organization.

    Hi,
    How to setup the security based on roles in Organization.
    For example:Few users are Manager and a few user are Non Manager .Manager should have access to all work data including Non Manager and Non Manager should access based role.How to setup this? How OBI server identify the user role?
    kindly let me know.
    Regards.,
    CHR

    Hi,
    You need to have Back End support to achieve this. In Back End you need to create two groups . You need to know what joins has to be made for which group (which is more important) and also make session variable for the userrole (with SQL supporting it). In the BMM layer, we need to put the security join conditions in the 'where clause'.
    And make a common report. User loggin in with the respective userid will have userrole and joins assigned in the Back end. And they will be viewing the report according to their access.
    Hope this will solve your problem.
    Regards
    MuRam

  • My captche image is not popping up in the pages to start new accounts or new memberships. It is used for security reasons. how do I fix it? everything is fine up to that point.

    the distorted image in the setup for new accounts does not appear.

    If images are missing then check that you aren't blocking images from some domains.
    See:
    * http://kb.mozillazine.org/Images_or_animations_do_not_load
    * Check the permissions for the domain in the current tab in Tools > Page Info > Permissions
    * Check that images are enabled: Tools > Options > Content: [X] Load images automatically
    * Check the exceptions in Tools > Options > Content: Load Images > Exceptions
    * Check the "Tools > Page Info > Media" tab for blocked images (scroll through all the images)
    There are also extensions (Tools > Add-ons > Extensions) and security software (firewall, anti-virus) that can block images.
    * https://support.mozilla.com/kb/Troubleshooting+extensions+and+themes

Maybe you are looking for

  • Novice question: ArrayList error

    Two classes: Bank and Customer. Customer class has this constructor: public class Customer { protected String cust_name; protected int card_number; protected double current_bal; protected double credit_limit; public Customer(String ID, int CCN, doubl

  • How to install the Win XP on my notebook

    I have purchased a Satellite notebook, which came with Vista installed and a couple of discs to "rollback" to XP if I so desired. I find Vista to be an absolute dog of a product, so I inserted my XP disc and waited. Turns out there is no autorun file

  • Cannot save Premiere Pro CS6 project to our server.  Keep getting error message.

    We have just replaced/renewed all of our workstations and server.  PC. Started using the Adobe Creative Cloud subscription service.  Absolutely love the software BUT we have one rather big problem I can't figure out...When we create a new project in

  • Setting JPanel/JButton size

    I recently wrote a GUI with one JPanel that contained a 4x3 grid of JButtons, each containing a picture that was 112x121 pixels. Using just this one JPanel in the JFrame it worked fine, the buttons were the right size for the pictures because of the

  • I can't eject a disk--what to do? URGENT help needed :-)

    Hey everyone, I put a CD with photos in my Macbook, of the sort you get if you ask the photo developers' lab to put your images on a CD. I'm trying to eject it but it won't let me. I have tried dragging and dropping the desk top icon to the trash, go