Software Protection vs Dongle Protection

Hi,
I have a C# .NET software and I would like to deploy it with protection. I though many times of the [Product Key] which will be generated from a mix of hardware serials but I saw some applications such as Micros POS using the USB Dongle Protection.
Which one you recommend?
Thanks

the .Net BCL documentation does not contain any software programming guidance. I suggest you to visit a software design forum and do some market research to know your customers (e.g. do they want an extra device hooked to their machines?).. 
Visual C++ MVP

Similar Messages

  • HT4623 I have recieved notification for the latest Iphone software which is password protected. I dont know the passcode

    Trying to download latest software which is passcode protected, i do not know the pass code

    Your profile says you have 7.1.1..... that s the latest

  • Does antivirus software installed on windows protect my os?

    i'm running both snow leopard and win 7 on my mac pro through parallel. i installed ms security essentials on my windows 7, and wonder if it also offers protection for my mac os. my common sense is telling me NO, but i really don't know how parallel works, so just wanna make sure. I also have Sophos installed for my OS, but recently a file named sophosavagent is eating up almost 100% CPU usage when i scan my OS. Does anyone have similar issues?
    Best,
    Chu

    No.

  • Securing Hardware and Software by using dongles

    Hi folks,
    I'm currently evaluating dongle usage from marx (www.marx.com) and WIBU
    (www.wibu.com) to protect my hardware and Labview written software from
    beeing copied.
    Does anybody have any experience in doing this?
    I've done quite some reading in the SDKs of the dongle software, but I'm
    not shure which one to use and how to involve it in LabVIEW to have high
    security.
    Ciao,
    Rainer

    In a recent thread on this topic, someone found this to work nicely with LabView:
    http://www.sg-lock.com/us/support.php
    Please post your evaluation which dongles work well, as software protection is really an issue to many of us.
    Felix
    www.aescusoft.de
    My latest community nugget on producer/consumer design
    My current blog: A journey through uml

  • Protected pages not protected...

    Hello,
    I use Sun Java System Application Server Platform Edition 9.0 Update 1 Patch 1 and NetBeans 5.5.
    I have tried to protect some pages like it is explained in the page http://testwww.netbeans.org/kb/articles/security-webapps.html but the protected pages are not protected at all: no form is displayed to ask me the name and the password of the user and the protected pages are displayed. I have certainly made a basic error but I cannot find it.
    Please, can you help me?
    Thanks in advance for your answers.
    Richard
    Here are the web.xml and the sun-web.xml of my application.
    web.xml:
    <?xml version="1.0" encoding="UTF-8"?>
    <web-app version="2.5" xmlns="http://java.sun.com/xml/ns/javaee" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://java.sun.com/xml/ns/javaee http://java.sun.com/xml/ns/javaee/web-app_2_5.xsd">
    <session-config>
    <session-timeout>
    30
    </session-timeout>
    </session-config>
    <welcome-file-list>
         <welcome-file>
    index.jsp
    </welcome-file>
    </welcome-file-list>
    <security-constraint>
    <display-name>AdminConstraint</display-name>
    <web-resource-collection>
    <web-resource-name>Admin</web-resource-name>
    <description>Admin zone</description>
    <url-pattern>/secureAdmin/*</url-pattern>
    <http-method>GET</http-method>
    <http-method>POST</http-method>
    <http-method>HEAD</http-method>
    <http-method>PUT</http-method>
    <http-method>OPTIONS</http-method>
    <http-method>TRACE</http-method>
    <http-method>DELETE</http-method>
    </web-resource-collection>
    <auth-constraint>
    <description/>
    <role-name>Admin</role-name>
    </auth-constraint>
    </security-constraint>
    <security-constraint>
    <display-name>UserConstraint</display-name>
    <web-resource-collection>
    <web-resource-name>User</web-resource-name>
    <description>User zone</description>
    <url-pattern>/secureUser/*</url-pattern>
    <http-method>GET</http-method>
    <http-method>POST</http-method>
    <http-method>HEAD</http-method>
    <http-method>PUT</http-method>
    <http-method>OPTIONS</http-method>
    <http-method>TRACE</http-method>
    <http-method>DELETE</http-method>
    </web-resource-collection>
    <auth-constraint>
    <description/>
    <role-name>User</role-name>
    </auth-constraint>
    </security-constraint>
    <login-config>
    <auth-method>BASIC</auth-method>
    <realm-name>file</realm-name>
    </login-config>
    <security-role>
    <description>Administrators</description>
    <role-name>Admin</role-name>
    </security-role>
    <security-role>
    <description>User</description>
    <role-name>User</role-name>
    </security-role>
    </web-app>
    sun-web.xml:
    <?xml version="1.0" encoding="UTF-8"?>
    <!DOCTYPE sun-web-app PUBLIC "-//Sun Microsystems, Inc.//DTD Application Server 9.0 Servlet 2.5//EN" "http://www.sun.com/software/appserver/dtds/sun-web-app_2_5-0.dtd">
    <sun-web-app error-url="">
    <context-root>/WebApplicationSecurity</context-root>
    <security-role-mapping>
    <role-name>Admin</role-name>
    <principal-name>admin</principal-name>
    </security-role-mapping>
    <security-role-mapping>
    <role-name>User</role-name>
    <principal-name>user</principal-name>
    </security-role-mapping>
    <class-loader delegate="true"/>
    <jsp-config>
    <property name="classdebuginfo" value="true">
    <description>Enable debug info compilation in the generated servlet class</description>
    </property>
    <property name="mappedfile" value="true">
    <description>Maintain a one-to-one correspondence between static content and the generated servlet class' java code</description>
    </property>
    </jsp-config>
    </sun-web-app>
    PS. When I start the server, an error is displayed but the server starts nevertheless:
    Could not load Logmanager "com.sun.enterprise.server.logging.ServerLogManager"
    java.lang.ClassNotFoundException: com.sun.enterprise.server.logging.ServerLogManager
    at java.net.URLClassLoader$1.run(URLClassLoader.java:200)
    at java.security.AccessController.doPrivileged(Native Method)
    at java.net.URLClassLoader.findClass(URLClassLoader.java:188)
    at java.lang.ClassLoader.loadClass(ClassLoader.java:306)
    .......

    If you're using Windows Vista, then SJAS simply ignores security constraints under the current version. There's an easy test. If you install the server and ask it not to remember your admin password, but request it from you each time, does the admin utility actually do so? If so...
    Go get the latest Glassfish distribution and use it. Bit more of a pain, no windows service, but it works.

  • Protect and End protect in SAPSCript.

    Hi all
    I have a sapscript wherein the texts comes from different text elements.
    /E    581
    /E   582
    I need to put the texts from these text elements in one page.
    Can the control commands PROTECT ...ENDPROTECT weritten in different text elements help in achieveing this. 
    code as follow:
    /E    581
    /:     PROTECT
    /E   582
    /:     ENDPROTECT
    Pls provide your inputs.
    Regards,
    Stock

    Hi,
    we have to use those within the text elements...
    protect endprotect should be used with in a text element
    so that i can protect the page breaks
    /E   abc
    protect
    endprotect
    /e   abc1
    protect
    endprotect
    thanks & regards,
    Venkatesh

  • Just upgraded to 10.4.7 by Software Update - Avid dongle not working

    I upgraded as I always do thru the Software Update - so it's the combo. Never really had problems like this before.
    I had to reboot many times to get the desktop to come up - ran disk utilitly and fixed permissions and disk - no many errors. All fixed.
    But can't run Avid Xpress pro - Avid says its a dongle combatability issue and is working on it.
    I am asking here because I am lookin for other ideas - and I know there are many people with problems right now. I haven't used very many applications yet because of the holidays.
    Someone already tried to go back to 10.4.6 with no luck.
    Any suggestions.
    PowerMac G4 Dual and PB G4 17'   Mac OS X (10.4.7)  

    FYI - there has been an unofficial fix that works -
    download the driver for the dongle.
    http://sonicstudio.com/releases/SentinelDriver10.zip
    It works.
    i am on 10.4.7 and was freaked when it didnt work but this driver did the trick
    thakyou

  • Old Software with Parallel Dongle or Hardware Key

    Hello,
    I'm trying to run old software that uses a HASP/hardware key/dongle on the parallel port.  Any helpful ideas on how to get the software to see it in Virtual PC, XP Mode?
    Much appreciated,
    Dave

    Hi,
    Parallel ports are not supported by XP Mode in Windows 7.
    Please refer to the following similar thread:
    https://social.technet.microsoft.com/Forums/en-US/4890a9d4-d4e7-4875-a7b0-69188b3c14e0/using-xp-software-with-a-parallel-port-dongle-in-windows-7-professional?forum=w7itprovirt
    Karen Hu
    TechNet Community Support

  • Export Inactive protection for previous protected data

    Hello,
          I'm running DPM 2012 R2 and running low on disk space. I have 4TB data that is inactive but need to retain for xx amount of days.  Is it possible to export the inactive data off to a different server
    or usb drive?  And can I still recover from the inactive data if need be?  Thank you. 

    Hi,
    USB-drives is not supported to add to the DPM diskpool and the Cmdlet MigrateDatasourceDataFromDPM.ps1 is
    not supported to use on a inactive data source.
    If you are able to present disk-space from another server to the DPM-server as a volume and put the inactive data into protection groups, you could use the MigrateDatasourceDataFromDPM.ps1 too
    move the 4TB of data and its recovery points to the other server.
    If you want to use an USB-drive, which I however not recommend, you could perform a recovery of the data and manually copy it to the USB-drive.

  • System Center 2012 Endpoint Protection - Real-time Protection won't turn on

    Real-time protection is enabled in settings, but fails to turn on:
    Error when I try and start it:
    System Center Endpoint Protection coun't turn on real-time protection.  This operation returned because the timeout period expired. Error code: 0x800705b4

    Hi, 
    Based on your description, this might happen when the previous forefront files are not being completely uninstalled from the computer. 
    Another important aspect for troubleshooting is to look into computer registry. You need to clean the residual records of previous forefront.
    Also, you should install a new .NET framework. If the current version does not work after repairing, you need to download the latest one on Microsoft official website and install it on your computer.
    We
    are trying to better understand customer views on social support experience, so your participation in this
    interview project would be greatly appreciated if you have time.
    Thanks for helping make community forums a great place.

  • FRR NNHOP node protection with multiple protected nodes?

    Hello
    Is it possible to deploy a Fast Reroute (FRR) backup tunnel terminating in a node several next-hops downstream instead of just one?
    All the examples i found in the documentation about FRR Node Protection, -or NNHOP-, always illustrates one protected node only. My question is if I can terminate the backup tunnel far beyond with the aim to include a chain of several protected nodes in between, not just one.
    Thanks in advance

    Hi Albert,
    Are you looking for something similar to path protection?
    http://www.cisco.com/en/US/docs/ios/mpls/configuration/guide/mp_te_path_prot.html
    regards
    Ashish

  • Protected members not protected?

    I thought a protected member could only be accessed by the implementing class or an extension of it. Yet I have been able to set these variables inside another class. Is their something wrong with my JVM???
    1.4.1_05
    public class ComponentModel extends ContainerModel implements IComponentModel{
        private static final long serialVersionUID = 1;   
        public static final ModelType TYPE = ModelType.getType("LogicComponentModel");
        protected transient PropertyChangeListener pcl = new LCMPropertyChangeListener();
        //transients are assigned in contructors and clone and serialization methods
        //for consistency.
        protected transient Point m_offset;
        protected transient Rectangle m_sizeRect;
    public final class WADComponentModel implements IComponentModel {
        public IBaseModel getCopy(){
            ComponentModel lcm = (ComponentModel)new ModelFactory(ComponentModel.TYPE).getNewObject();
            for(Iterator it = getChildren().iterator();it.hasNext();){
                IBaseModel model = (IBaseModel)it.next();
                model.setComponent(lcm);
                model.addPropertyChangeListener(lcm.pcl); //???
            lcm.m_offset = new Point(m_offset); //???
            lcm.m_sizeRect = new Rectangle(m_sizeRect);  //???
            return lcm;
    }why am I able to set m_offset and m_sizeRect directly like this? Why am I able to access lcm.pcl directly???
    Surely I have forgotten some simply Java principle. Or my Eclipse environment is somehow hosed.

    As an above poster mentioned, if you scroll up it is described more clearly. I will post it though.
    A member (class, interface, field, or method) of a reference (class, interface, or array) type or a constructor of a class type is accessible only if the type is accessible and the member or constructor is declared to permit access:
    If the member or constructor is declared public, then access is permitted. All members of interfaces are implicitly public.
    Otherwise, if the member or constructor is declared protected, then access is permitted only when one of the following is true:
    Access to the member or constructor occurs from within the package containing the class in which the protected member or constructor is declared.
    Access is correct as described in ?6.6.2.

  • How to block Protection removal of a PDF document from other softwares?

    Hi,
         I have created a PDF document  with acrobat reader and watermarked the document and protected the document. But the problem is that it can easily be unprotected (decrypt). After that the document is decrypted, there is no protection symbol on the document and the watermark was removed. Is there any way to block other softwares from removing the protection?
    Jomon Antony
    Operations Manager
    [link removed]

    While we are at it, you can not create a PDF with Reader. I assume you meant Acrobat that is a different product. For most folks the PDF security is adequate, but it is not that full proof and that is apparently your concern. About the only way around the problem is DRM as mentioned. Also, be sure to add the copyright statement as that is enough to discourage most folks.

  • Data recovery planning for DRM protected musi

    Hi folks,
    I'm curious to hear from you on this topic: <FONT color=#cc0000>how do you protect your DRM-protected music (with download license, <EM>not subscription</EM>) - and I mean: data backup and recovery.
    Let me put it this way: I'm interested in buying music online, as opposed to buying CDs as I did until now. But I'm real concerned about the implications of the DRM.
    If I see how much trouble it costs to do proper data recovery planning (i.e. a backup plan and execution) for my home pc, and how much data tends to get lost when transitioning to new PC or OS, and how quickly internet economy can shift to new hypes and solutions, I'm simply afraid that all these DRM restrictions will mean that in 5 years from now, I will not be able to use the music I buy today.
    Reason can be : data loss, format changes, companies out of business, changing to OS (Linux, ...) that doesn't have the DRM appropriate software, etc, etc...
    So, for instance, do you convert all your DRM music to DRM-free formats? Or how do you answer the above question for yourself?
    I emphasize that I'm talking about personal and legal backups here, and no more than that.
    thanks for sharing!
    Fred

    I wish music store wouldn't try to hide the important info relating to their DRM/audio format infrastructure. I mean, some make it clear, but some are just straight up opaque. Here is my list as of right now of what I know about each service and what it allows for purchased music.
    I Li've In The US, So I'm Only Posting Usage Guidelines for US Music Stores.
    Apple iTunes Music Store:
    Format = AAC (M4P)
    Bitrate/Quality = 28kbps CBR
    Allowed Machines = 5
    Can Re-download Purchased Music = No
    DRM = FairPlay
    Subscription Service = No
    Subscription Devices = No
    CD Burning = 7 Playlist Burns Of The Same Music In A Row.
    Device Exportation = Unlimited.
    Napster 3.0:
    Format = Windows Media Audio
    Bitrate/Quality = 28kbps CBR
    Allowed Machines = 3
    Can Re-download Purchased Music = Yes
    DRM = Windows Media DRM
    Subscription Service = Yes
    Subscription Devices = Yes
    CD Burning = 7 Playlist Burns Of The Same Music In A Row.
    Device Exportation = Unlimited.
    MusicMatch Jukebox 0. (Purchases)
    Format = Windows Media Audio
    Bitrate/Quality = 60kbps VBR
    Allowed Machines = 5
    Can Re-download Purchased Music = No
    DRM = Windows Media DRM
    Subscription Service = Yes
    Subscription Devices = Yes
    CD Burning = 7 Playlist Burns Of The Same Music In A Row.
    Device Exportation = Unlimited.
    MusicMatch Jukebox 0. (On-Demand Subscription)
    Format = Windows Media Audio
    Bitrate/Quality = 92kbps CBR
    Allowed Machines = 3
    Can Re-download Subscription Music = Yes
    DRM = Windows Media DRM
    Subscription Service = Yes
    Subscription Devices = Yes
    RealPlayer Music Store
    Format = RealAudio 0 (RAX)
    Bitrate = 92kbps CBR
    Allowed Machines = 5
    Can Re-download Purchased Music = No
    DRM = Helix*
    Subscription Service = No
    Subscription Devices = No
    CD Burning = 7 Playlist Burns Of The Same Music In A Row.
    Device Exportation = Unlimited.
    RealRhapsody 3.0 (Purchases)
    Format = RealAudio 0 (RAX)
    Bitrate = 92kbps CBR
    Allowed Machines = 3
    Can Re-Download Purchased Music = Yes
    DRM = Helix*
    Subscription Service = Yes
    Subscription Devices = Yes
    CD Burning = 7 Playlist Burns Of The Same Music In A Row.
    Device Exportation = Unlimited.
    RealRhapsody 3.0 (Subscription)
    Format = Windows Media Audio
    Bitrate = 60kbps CBR
    Allowed Machines = 3
    Can Re-Download Subscription Music = Yes
    DRM = Windows Media DRM
    Subscription Service = Yes
    Subscription Devices = Yes
    Yahoo Music Unlimited (Purchases And Subscription)
    Format = Windows Media Audio
    Bitrate = 92kbps CBR
    Allowed Machines = 3
    Can Re-Download Purchased Music = No
    Can Re-Download Subscription Music = Yes
    DRM = Windows Media DRM
    Subscription Service = Yes
    Subscription Devices = Yes
    CD Burning = 7 Playlist Burns Of The Same Music In A Row.
    Device Exportation = Unlimited.
    Sony Connect
    Format = ATRAC3 (Not ATRACplus)
    Bitrate = 32kbps CBR
    Allowed Machines = 5
    Can Re-Download Purchased Music = Yes
    DRM = OpenMagicGate (OpenMG)
    Subscription Service = No
    Subscription Devices = No
    CD Burning = 7 Playlist Burns Of The Same Music In A Row.
    Device Exportation = Unlimited for all, except Warner Music Group Music which is 3.
    Virgin Digital (Purchases)
    Format = Windows Media Audio
    Bitrate = 28kbps CBR
    Allowed Machines = 5
    Can Re-Download Purchased Music = Yes
    Subscription Service = Yes
    Subscription Devices = No
    CD Burning = 7 Playlist Burns Of The Same Music In A Row.
    Device Exportation = Unlimited.
    Virgin Digital (Subscription)
    Format = Windows Media Audio
    Bitrate = 28kbps CBR
    Allowed Machines = 3
    Can Re-Download Subscription Music = Yes
    Subscription Service = Yes
    Subscription Devices = No
    MSN Music
    Format = Windows Media Audio
    Bitrate 60kbps VBR
    Allowed Machines = 5
    Can Re-Download Purchased Music = Yes
    Subscription Service = No
    Subscription Devices = No (Coming)
    CD Burning = 7 Playlist Burns Of The Same Music In A Row.
    Device Exportation = Unlimited.
    Wal-Mart Digital Downloads***
    Format = Windows Media Audio
    Bitrate = 28kbps CBR
    Allowed Machines =
    Can Re-Download Purchased Music = Yes
    Subscription Service = No
    Subscription Devices = No
    CD Burning = 0 Burns
    Device Exportation = Unlimited.
    MusicNow*** (Purchases)
    Format = Windows Media Audio
    Bitrate = 28kbps CBR
    Allowed Machines =
    Can Re-Download Purchased Music = Yes
    Subscription Service = Yes
    Subscription Devices = No
    CD Burning = Unlimited On Some, 0 On Others.
    Device Exportation = Unlimited.
    MusicNow (Subscription)
    Format = Windows Media Audio
    Bitrate = 28kbps CBR
    Allowed Machines = 3
    Can Re-Download Subscription Music = Yes
    Subscription Service Yes
    Subscription Devices = No
    F.Y.E Digital Downloads (Purchased)
    Format = Windows Media Audio
    Bitrate = 28
    Allowed Machines = 5
    Can Re-Download Purchased Music = No
    Subscription Service = Yes
    Subscription Devices = Yes
    CD Burning = 7 Playlist Burns Of The Same Music In A Row.
    Device Exportation = Unlimited.
    F.Y.E. Digital Downloads (Subscription)
    Format = Windows Media Audio
    Bitrate = 28kbps
    Allowed Machines = 3
    Can Re-Download Subscription Music = Yes
    Subscription Service = Yes
    Subscription Devices = Yes
    PureTracks
    Format = Windows Media Audio
    Bitrate = 28kbps
    Allowed Machines = 3
    Can Re-Download Purchased Tracks = Yes
    Subscription Service = No
    Subscription Devices = No
    CD Burning = Unlimited On Some; 0 On Others.
    Device Exportation = Unlimited.
    BuyMusic.com
    Format = Windows Media Audio
    Bitrate = 28kbps and selected 256kbps Songs.
    Allowed Machines = Generally 5
    Can Re-Download Purchased Tracks = Yes
    Subscription Service = No
    Subscription Devices = No
    CD Burning = 7 Playlist Burns Of The Same Music In A Row.
    Device Exportation = Varies.
    ***To Obtain Licenses For Purchased Songs On Other Machines You Might Haft to E-mail Them.
    Some Of These Providers Do Not Gi've Anymore Licenses. BuyMusic I believe does not. Virgin gives 5 licenses and that it.
    iTunes, MSN Music, Real MusicStore, Sony Connect, Rhapsody, Yahoo Music, and MusicMatch all use the authorize/deauthorize DRM scheme. The others just give you up to, 3 license's at a time, sometime just .
    MSN Music U.S. States:
    What if I lose my music?
    MSN is not responsible for lost downloads, and you should always ensure that you maintain a current backup of your music. MSN Support can replace lost downloads only under certain circumstances such as the crash of your computer's hard disk dri've.
    If you feel you have encountered circumstances that warrant a replacement of one or more of your purchased tracks please contact MSN Support for further assistance.Message Edited by bigcraig0 on 09-08-2005 0:05 PM

  • Do I need to have any type of anti-virus or malware, spyware protection for my Macbook Pro?

    My Macbook is a year old. When I bought it, I was told by several people that I would not need any type of anti-virus software or anything to protect my computer because Mac did not get infected that often. However, I have had people today tell me that I do need protection for my computer. My Mac runs about as good as the day I got it, but I really don't want anything to happen to it. If I need to get an anti-virus, or malware/spyware software, what programs would y'all recomend? I am just looking for information. Thanks!

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. OS X security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. XProtect, Gatekeeper, and MRT reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use the free software  ClamXav— nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer is going to be infected every time you install an application, read email, or visit a web page. But neither should you have the false idea that you will always be safe, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

Maybe you are looking for

  • TS4002 Does anyone know why it would take messages that have already been downloaded a long time to open?

    My mail in iCloud is taking a very long time to load messages.  ICloud loads but when I click on a message it takes up to a minute to bring the message up.  Any ideas?

  • Multiple users on Mail

    Hi - this is probably a silly question. My wife and I share our mac. when we set it up we did not set up multiple accounts as was too complicated to share photos in iphoto, addresses etc. would like though to be able to "split" our use of mail. can e

  • Flash Player 11 temporarily hangs IE and Chrome

    I work for an IT consulting company and I've got an unusual situation that I'm trying to help a client with.  My client has had slow internet problems for several weeks.  She is the only one on the network having the issue.  I traced the issue back t

  • Opening Hotmail in Firefox closes Firefox and opens IE

    Today when I tried to open Hotmail from Firefox 12, Firefox closed and IE opened up. I've tried several times and the same thing happens. I noticed my homepage had changed to Ask.com as well - not sure if this is coincidence or related.

  • Urgent!!! OAM install

    My OAM points to OID (VIP, and separate data store for user and policy,configuration; replicated) It so happened that they reinstalled OID user store and from that time I having problems setting up OAM. It worked fine before that. So, after the reins