Third party security program for Macs?

Hello!
I'm wondering if there's a preferred third party program for security on a Mac?
What I'm looking for is something that functions similarly to zonealarm, in that it alerts you to what's coming into or going OUT of your computer.
iMacs G5 & G3   Mac OS X (10.4.3)   Panther on G3, Direcway 6k cnsmr sat. cnct., netgear ethernet swtch to 4 cmptrs.

electriczipper,
Detecting and avoiding malware and spyware, by Dr. Smoke lists an often recommended application named Little Snitch.
;~)

Similar Messages

  • Looking for a third-party affiliate program that will integrate well with Adobe Business Catalyst.

    Dear Adobe Community,
    I am looking for a third-party Affiliate Program that will integrate well with the Adobe Business Catalyst platform.
    The requirement is fairly basic, i.e.,  to track multiple affiliates and down-stream affiliate-to-affiliate referrals. Also looking to report and display these referrals an affiliate’s dashboard.
    We have looked into Affiliate Program Software, Affiliate Tracking Software Marketing and would like to entertain other options before making a decision.
    Any assistance would be greatly appreciated! —Thank You!
    Kind Regards,
    Doug McClure

    For what it is worth, I am a fan of NuGen, I have both SEQ 1 and 2 and two stereo enhancing tools (stereoizer and stereoplacer I think they're called). Since I have the SEQ 1 it replaces all Channel EQ's. And the stereotools sound great and very lush, in stead of the more usual cheezy combfilterthingies that pass for stereo enhancing tools.
    And I actually like the interfaces. Simple, but stylish, functional and ergonomic (in this case meaning you can see all parameters in a quick glance, no guessing at settings).

  • Is there a third party trasistion program like hollywood fx for cs6 ??

    I need some transistions like hollywood fx - is there a third party plug in for adobe premier pro cs 6.01?

    its not the "L shape" that holds it better rather the higher GAUSS rating on the older connector.
    Apple redesigned the NEW magsafe to be weaker AND of a diff. design with lower neodymium magnetic gauss rating for a reason
    people at coffee shops etc were getting their macbooks yanked to the ground when someone tripped over the cord.
    The new neodymium is a N35 gauss and the older Lshape was N40 or N45 gauss (too tight)
    I know what youre talking about, but Apple redesigned it that way for several good reasons, despite it "coming out easier" on the bed for which ,
    as Apple Inc. states, it is "not intended to be used" (nor in laps, couches...etc.)

  • What is the best security software for mac?

    I had Norton years ago but found it slowed things down unacceptably at the time and so have never revisited it since. However, as internet infection becomes more prevalent on Macs I am considering some kind of protection.
    1. What is the general feeling for the most optimal security software for Mac kit?
    2. Are there any side effects that one should be aware of which might affect the Mac or software operations?
    Thanks and regards

    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to log in to it remotely. That threat is in a different category, and there's no easy way to defend against it.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    ☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    ☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    ☞ It can easily be disabled or overridden by the user.
    ☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    ☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has so far failed to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. These failures don't involve App Store products, however.
    For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, and a technological fix is not going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the scam artists. If you're smarter than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
    ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software.
    ☞ Rogue websites such as Softonic and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    ☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    ☞ High-priced commercial software such as Photoshop is "cracked" or "free."
    ☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission.
    Conditional or unsolicited offers from strangers
    ☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    ☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    ☞ You win a prize in a contest you never entered.
    ☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    ☞ Anything online that you would expect to pay for is "free."
    Unexpected events
    ☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
    ☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    ☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    ☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" (AV) or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    ☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    ☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    ☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    ☞ Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in every email attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It's as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • I'd like to use Turbo Lister Program for eBay. But it's PC Program. Which program same this program for mac? Please suggest for me. ll^_^ll

    I'd like to use Turbo Lister Program for eBay. But it's PC Program. Which program same this program for mac? Please suggest for me. Thank you. ll^_^ll

    set the wake-on lan on the main computer
    The laptop's too far away from the router to be connected by ethernet. It's all wifi.
    No separate server app on the laptop, it's all samba
    The files are on a windows laptop and a hard drive hooked up to the windows laptop. The windows share server is pants, so I'd need some sort of third party server running. Maybe you weren't suggesting to use Samba to connect to the windows share though?
    I'm glad that you've all understood my ramblings and taken and interest, thanks The way I see it, I can't be the only netbook user these days looking for this kind of convenience, and I certainly won't be once chrome and moblin hit the market.
    Last edited by saft (2010-03-18 20:38:08)

  • What are the third party tools available for Encryption in Oracle database?

    Dear All,
    Can you please help me with the below question?
    What are the third party tools available for Encryption in Oracle database? Please let me know if you know their feedback and also licensing/cost information

    Why would you spend money to purchase a third-party tool that will be, almost by definition, less secure than the tools inside the product you already own and paid for?
    http://www.morganslibrary.org/reference/pkgs/dbms_crypto.html
    But were I to have any to recommend one I would not do so without knowing information you seem to consider unimportant such as:
    1. Operating system
    2. Database edition and version
    3. What type of data needs to be secured
    4. What level of security is required

  • SSL - Installing Third party secure certificates

    Hi,
    I am having problem while importing third party secured certificates (Verisign).
    In STRUST, after import It was still saying Self-Signed message for third party certificates. I am not sure weather this is correct behavior or not.
    After launch browser, the certificate status showing with message
    "This CA Root certificate is not trusted because it is not in the Trusted Root Certification Authorities store."
    Please help me to solve this issue. Any other procedure we need to follow to import third party certificates
    Thanks in advance
    Regards
    Srinivas

    I'm guessing, you'll need to download the Verisign Trusted Root CA certificate from verisign.com and import it into your certificate list in STRUSTSSO2. Under the System PSE node.
    If you doubeclick the response certificate from Verisign, you may be able to see what is heirarchy / trust chain for verisign certs. If it's more than just root, cert, you'll probably need to add the intermediate certs too. Check out verisign link, maybe it'll explain better.
    https://www.verisign.com/support/ssl-certificates-support/page_dev028341.html
    Also is the self signed message on teh SSL Server PSE node, or the server node? it shouldn't say self-signed if it's the (as example below) sapserver_sid_00 node.
    SSL Server
       |_  sapserver_sid_00
    Hope that helps.
    regards,
    Laurence...
    disclaimer:
    The content of this message is my personal opinion only and, the statements I make here in no way represent my employer's position on the issue, nor am I authorized to speak on behalf of my employer on this matter.

  • Third Party Remittance config for Canada

    I have a requirement as follows:
    Third Party Remittance programs are to be available for use by Canada.
    When executing program PC00_M07_K500 we get the below error message
    Entry notfound for wage type: /102
    Business number : XXXXXXXXX and prov. of employment:
    Please check table T5KRC.
    Can someone help me out with the steps to configure TPR for CAnada? I've searched everywhere but cannot find a config guide?

    I got the answer. I tested with changing the processing class it's working fine without any issues.

  • Third-party Geocoding Program

    Dear All,
    I am looking for a Third-party Geocoding Program to integrate our TM 8.0 system. Do you have any suggestion for that?
    Regards,
    Mehmet YILMAZ

    I would start with IGS, but look at the following SAP Notes for more information:
    458731 Internet Graphics Service: Main Note
    454042 IGS: Installing and Configuring the IGS
    1135220 Installing IGS together with PTV servers
    1159083 Properties of the Windows standalone IGS
    1403895 SAPGISXML: IGS / PTV interface configuration
    793473 Applying a patch for Windows standalone IGS
    844669 Profile parameter of IGS as of Version 7.x
    There is also a CSA Deployment Accelerator white paper detailing the GIS integrations with TM using ALK's PCMiler application.  PCMiler is more than just Geo-Coding.  If you have some interest in this, let me know.
    Regards,
    Mike

  • Are there any good DVD authoring programs for Mac now that Apple has discontinued DVD Studio and iDVD? I need to make DVDs that have interactive menus and such (Final Cut X and Compressor 4's DVD option is a little cheap). Any ideas?

    Are there any good DVD authoring programs for Mac now that Apple has discontinued DVD Studio and iDVD? I need to make DVDs that have interactive menus and such (Final Cut X and Compressor 4's DVD option is a little cheap and doesn't provide any kind of professional DVD authoring). Any ideas?

    This comes up a lot these days.
    Practically speaking, there are really four options for the Mac platform: Toast (<$100),  Adobe Premier Productiom ($1,600 to buy or $50/month to rent),  find a copy of Final Cut Studio from 3rd  party (+/- $1,000 new) or a boxed edition of iLife to get iDVD ($50 - $90 on Amazon new).
    The other question everyone has is how many OS versions before iDVD or FCS breaks? No one knows, but Apple has said they're no longer supporting these legacy apps. Of course, no one is mandated to upgrade to a new OS unless they buy a new computer. So if it works on a system, stay with it as long as it makes sense.
    Good luck.
    Russ

  • If the iMac is suppose to be secure from viruses, malware,spyware and other internet threats, then howcome i have seen internet security programs for the iMac?

    on the website it clearly stated "It’s highly secure and reliable"  and that "You don’t need to buy software to speed it up, keep it safe, or get it to work better."  and it also says that "The built-in defenses on a Mac help keep you safe from viruses and malware without the hassle of constant alerts and sweeps."   If this is the case, then howcome in download .com, i have seen internet security programs for the imac?
    So if one day i accidentelly stumble across a website that has malware in it, will the imac protect me?
    Theres this website that i feel to afraid to go to because some people reported a malware threat on that website. But will i be able to safely go to that website with the imacs security?
    Im just confused that there are these internet security programs for the imac despite of the imacs built in security.

    In addition to Kappy's excellent advice, you need to remember that only you can protect yourself (and your Mac) - for instance, I never go near any torrent site. Not only are most torrent downloads illegal, but quite a few softwares on those sites contain some not-so-nice additions (malware, etc). So, no, your Mac would not protect you there - you need to protect yourself; it is called "responsible websurfing".
    I only download software from reputable sites (i.e. the developer); I don't go to questionable sites at all (there is a great plugin for Firefox called "WOT" - it grades the sites from excellent to "poor reputation") - if you use Safari, check to see if it is available there. And I don't download "free" software or music or whatever that costs elsewhere - I pay for it.
    And, here is another article you might want to look at:
    http://www.reedcorner.net/guides/macvirus/

  • Does OSB10gr3 support third-party security providers?

    Does OSB 10gr3 support third-party security providers and third-party token handlers ?
    If so what are they?
    Edited by: dbr6 on Jun 26, 2009 6:01 PM

    OSB will work with any security provider that is designed as per http://download.oracle.com/docs/cd/E12840_01/wls/docs103/dvspisec/index.html. OSB completely relies on Weblogic security framework and doesn't do any official certification for third-party security providers.
    Cheers
    Manoj

  • How can I add my software in Adobe's Third-party plug-ins for Adobe Premiere Pro ?

    Hi,
    Our company have a software called Moyea Importer for Adobe Premiere.
    Moyea Importer for Adobe Premiere is a recommended FLV, MPG, RMVB, HD  video import plugin for Adobe Premiere Pro. This plug-in enables users  to import FLV videos with various codec like AVC/H.264, AAC, Screen  Video, Nellymoser, MP3, PCM, and Sorenson H.263. Besides FLV video, the  plug-in allows AVCHD import and HD video import in MTS, M2TS, TP, TS,  and MKV formats.
    Moyea Importer for Adobe Premiere do not convert your video so it keeps  video quality for you. The plug-in automatically detects the Adobe Premiere versions on your  machine and you can choose the versions to install the plug-in. It  currently supports Adobe Premiere Pro 1.0/1.5/2.0/CS3/CS4 and Elements  3.0/4.0/7.0/8.0.
    I notice in Third-party plug-ins for Adobe Premiere Pro this part, Adobe didn't get any such plug-ins. They only have two file support plug-ins and Moyea Importer can fill the blank.
    Now I want to submit this software on Adobe's site but I don't know where to submit or who I should to contact. Any suggestions? I really need your help and I am sure it is really good software.

    Any suggestion? Admin of this board? Who can help me

  • What Download Video Program for Mac is as Good as Orbit is for Windows??

    12/29/2008. Friends, I have searched and searched and searched for a video download program for Mac that will download videos from almost any website besides just YouTube and such, but to no avail. The latest OrbitDownloader 2.8.1 for Windows is excellent and will do this for Windows on a PC. What similar download video program for Mac will perform as excellently or almost as good?? I've tried Firefox's Video Downloader Helper but can not get it to work. I've tried Mori but don't know how to get it to work. I've tried Perian but again don't know how to get it to work, I just get a window that says "Uninstall." I will really appreciate finding such a program for Mac, for my iBook G4 which has Leopard OS X 10.5.4 and WiFi. Many thanks. Chuck Y., Chicago

    1/2/2009. Thank you all for your help. I love this wonderful feature I find about Apple Discussion Forums, so many friends. I did not know about Perian's instructions until you informed me. [www.perian.org/#watch] I'm glad that I gave the example of "POV Inheritance," because it is somewhat complex. First a person must locate the POV Inheritance website. For Perian, to go into Windows Activity at that point shows only that line. No one told me that I must click the wee arrow to the left of that line. Then a long drop list appears. But none of those help. So one must return to and on the website click "Watch the streaming video online" or ". . . now." That brings up another sub-website on which a person must click "Watch the Full Film." Then one can choose between five "chapters," and go into Windows Activity again. Then appears "net + public affairs player: video." Then one clicks the small arrow on the left of "net+ public affairs video" and sees 17 selections. All except one are small kbs. One has a large megabyte file. Select and Command + C that, and then go into Windows Downloads and Command + V [paste]. Then the download begins. And the person must do that for each of the five chapters. The other option is not to click any of the "chapters" but instead click "Watch the Full Film," and then click Windows Activity and then the small arrow left of "net + public affairs : video" and on the drop down list appear, among many, the five separate chapter files [the ones with large megabyte files], and continue as per a few lines above. The Perian procedure is simple. Getting to the line to be downloaded, in this case, is more complex, and so a good example from which to learn.
    RealPlayer 11.0.0 [or 11.0.1] and its RealPlayer Downloader work very well too and may be simpler.
    Thank you all and Happy New Year cruising with your Apple Macs. C. Yopst, Chicago

  • Third Party Payment Gateway for Physical Services

    I am very curious to learn on the validity of Integrating a Third Party Payment Gateway for offering the Physical services to the app users.
    One of my clients need to integrate a Payment Gateway for the User registration where the User's will be offered to play a physical shooting game upon registration with the app. What is the likelihood of the app rejection in this kind of scenario ?

    Hi Ahmed,
    I don't understand what exactly you need to do on your CSS because, from what you explained, the original URL and the second one are the same, and both requests are even done using SSL.
    Can you be more specific on what are your requirements?
    Daniel

Maybe you are looking for