What do you do for malware protection?

What do you do for malware protection?

Use an iPad (ok you're already doing that). Apple vets all apps through the App Store. If it's available in the App Store it is safe.
In general:
Do not click on any links sent in an email. These often direct you to fraudulent websites.
Know what it is you're installing. If you didn't ask for it you probably don't want it.
Use your head. Get savvy about phishing attempts. These are getting better every day and represent the single greatest threat you will encounter. It doesn't matter what kind of computer you use, phishing is the 21st century version of a con game that has been around since the paleolithic era.
The OP's question is for iPads but just in case, if you are using a Mac:
Do not install any anti-virus software. Period.

Similar Messages

  • What is the best antivirus/malware protection software for my iMac desktop

    What is the best antivirus/malware protection software for my iMac

    None is needed.
    Helpful Links Regarding Malware Protection
    An excellent link to read is Tom Reed's Mac Malware Guide.
    Also, visit The XLab FAQs and read Detecting and avoiding malware and spyware.
    See these Apple articles:
              Mac OS X Snow Leopard and malware detection
              OS X Lion- Protect your Mac from malware
              OS X Mountain Lion- Protect your Mac from malware
              About file quarantine in OS X
    If you require anti-virus protection Thomas Reed recommends using Dr.Web Light from the App Store. It's free, and since it's from the App Store, it won't destabilize the system. If you prefer one of the better known commercial products, then Thomas recommends using Sophos.(Thank you to Thomas Reed for these recommendations.) If you already use Sophos, then be aware of this if you are using Mavericks: OS X Mavericks- Sophos Anti-Virus on-access scanner versions 8.0 - 9.1 may cause unexpected restarts
    From user Joe Bailey comes this equally useful advice:
    The facts are:
    1. There is no anti-malware software that can detect 100% of the malware out there.
    2. There is no anti-malware that can detect anything targeting the Mac because there
         is no Mac malware in the wild, and therefore, no "signatures" to detect.
    3. The very best way to prevent the most attacks is for you as the user to be aware that
         the most successful malware attacks rely on very sophisticated social engineering
         techniques preying on human avarice, ****, and fear.
    4. Internet popups saying the FBI, NSA, Microsoft, your ISP has detected malware on
        your computer is intended to entice you to install their malware thinking it is a
        protection against malware.
    5. Some of the anti-malware products on the market are worse than the malware
        from which they purport to protect you.
    6. Be cautious where you go on the internet.
    7. Only download anything from sites you know are safe.
    8. Avoid links you receive in email, always be suspicious even if you get something
        you think is from a friend, but you were not expecting.
    9. If there is any question in your mind, then assume it is malware.

  • What application does an iMac come with that lets you see the core of its system, and what would you look for to determine if malware was on it?

    What application does an iMac come with that lets you see the core of its system, and what would you look for to determine if malware was on it?

    This extension?
    *FireBug: https://addons.mozilla.org/firefox/addon/firebug/
    Firefox 4 also has a build in inspector: Firefox > Web Developer > Inspect

  • I just purchased MBP and it is my first Apple computer. How concerned should I be about virus software and what do you recommend for security software?

    I just purchased MBP and it is my first Apple computer. How concerned should I be about virus software and what do you recommend for security software?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets (see below.)
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been another layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't actually been tested by Apple (unless it comes from the Mac App Store), but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. For most practical purposes, applications recognized by Gatekeeper as signed can be considered safe.
    Gatekeeper has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could find some other way to evade Apple's controls.
    For more information about Gatekeeper, see this Apple Support article.
    4. Beyond XProtect and Gatekeeper, there’s no benefit, in most cases, from any other automated protection against malware. The first and best line of defense is always your own intelligence. All known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source. How do you know whether a source is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    5. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was never a good idea, and Java's developers have had a lot of trouble implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style "virus" affecting OS X. Merely loading a page with malicious Java content could be harmful. Fortunately, Java on the Web is mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers. In Safari, this is done by unchecking the box marked Enable Java in the Security tab of the preferences dialog.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a specific task, enable Java only when needed for the task and disable it immediately when done. Close all other browser windows and tabs, and don't visit any other sites while Java is active. Never enable Java on a public web page that carries third-party advertising. Use it only on well-known, password-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow these guidelines, and you’ll be practically as safe from malware as you can be.
    6. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use the free software ClamXav — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    7. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    8. The greatest harm done by anti-virus software, in my opinion, is in its effect on human behavior. It does little or nothing to protect people from emerging threats, but they get a false sense of security from it, and then they may behave in ways that expose them to higher risk. Nothing can lessen the need for safe computing practices.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.

  • I´ve bought the new IPad3, what a disappointment the 3G does not work, no Internet available, APPLE what are you doing for the all the people in Germany who bought the new IPad3? I´m still an Apple fan, all my products are from Apple but I need a solution

    I have been waiting since months for the new IPad4G 64 Gbt. ON recommendation of Apple Support I have changed my IPad 4G last week in the hope that something was wrong with the firts one I bought.
    The one I have now has the same problems. WiFi is working however 4G not at all. Apple what can I do? What are you doing for the thausands of German Apple fans who have bought a IPad4G and can not use it. We need a solution NOW. I´m working with this tool and need to be able to rely on it.
    Thanks for a feed back.

    JKerki wrote:
    They had not heard about the problem, however made no problem to change it for an other one. Apple Support Germany pretendet not to know about this problem. However the web is full of complaints.
    It would be advisable for Apple to react officially on it. € 799, - for something that doesn´t function is no fun :-((
    Isn't replacing your iPad Apple "officially" acting on it?

  • Still on PS3? What are you waiting for?

    Are you still playing PlayStation 3? Why haven't you moved to the new generation with PlayStation 4? What are you waiting for? A specific game? The right price? Morpheus? 

    i'm broke at the moment, but in all fairness, I've got plenty of stuff to keep me busy as it is on my PS3 (as well as my WiiU, Amiga, Spectrum, 3DS, PC and Atarti2600) so I have no real need to upgrade. Furthermore, I'm not sure where to go next gen yet. It's tooe arly days to make a sensible decisison. Morpheus is callling to me, but currently I am much more impressed with the XboxOne with all its functionality, external HDD support and codecs, than the rather barren and user-unfriendly (for me anyway) PS4. I am also very angry and unforgiving with Sony for all the content removal on both my PS3 and SmartTV (which has lost Facebook, Midnight Pulp, Sony Entertainment TV, Crackle, Viewster and a whole host of other apps they decided they didn't want to run anymore.) As well as loads of things on the TV that just dont work properly that they cant be bothered to fix, incluing something that casues Youtube to crash all the time. The loss of PSHome was the final straw for me with Sony. Contrary to what a lot of people like to think it was very busy, and for me it was quite important, due to health issues I am fairly housebound, and it was a very good way for me to socialize.I just don't trust Sony anymore to make something that won't be downgraded in the near future. If Morpheus is great then I might be tempted to PS4 in time, but with rumors starting to emerge that the XboXone might support the Oculus, Sony have even lost the VR edge. Just wait and see for now.

  • What is the best antivirus/malware protection software for a MacBook Pro?

    I bought my MacBook Pro in April of 2011 and it's been running fine ever since then. I do not keep too many files on my laptop and have everything backed up on a 4TB external hard drive. I have programs that keep my MacBook running smoothly and as fast as possible by clearing out unnecessary files. Recently, my MacBook has become slow and I now normally have to click on a button at least three times before the page loads or refresh the page. Sometimes I even have to force quit Safari and restart from the beginning just to load a web page. Programs will quit unexpectedly and downloading something takes ten times longer. I fear there may be something wrong with my MacBook and it might have a virus or something. What is the best antivirus/malware software to download? I'm leaning towards Norton Antivirus for Mac or Intego Mac Internet Security. Could someone please help me?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. OS X security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use one of the free anti-virus products in the Mac App Store — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. An anti-malware product from the App Store, such as "ClamXav," doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An anti-virus app is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    Anti-virus software may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use the software unless a network administrator requires you to do it.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer is going to be infected every time you install an application, read email, or visit a web page. But neither should you have the false idea that you will always be safe, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • What kind of virus and malware protection do I need for my new iMac?

    I am new to Apple computers, what virus or malware protection do I need?

    Agreed, please read Thomas's guide!
    As a general rule of thumb though, no additional software is needed for malware or virus protection.  Apple computers are incredibly secure, the best protection is running Software Update often and not downloading from illegal software from torrent sites. Other than that, OS X is incredibly secure and best left alone to run well. 

  • What kind of virus or malware protection is recommended?

    I just got a new IMAC (home computor).  I called Apple support and they said Apple doesn't endorse or recomend any specific virus or malware for my Apple...  Any other users out there have any malware, spyware or anti virus app's they recomend to keep your PC virus free and running good?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. OS X security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. XProtect, Gatekeeper, and MRT reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use the free software  ClamXav— nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer is going to be infected every time you install an application, read email, or visit a web page. But neither should you have the false idea that you will always be safe, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • What are you waiting for?

    I wonder do you guys feel the same. I must wait very long times for some operations on my system.
    1) opening Firefox for a first time
    2) starting xfce4
    3) opening menu in xfce4 after some change (then it opens immediately)
    4) running pacman
    5) checking disk usage in ${HOME} (du|sort -nr|less)
    6) indexing incomplete movie (mplayer -idx) to preview it
    What are your experiences?

    pelle.k wrote:What am I waiting for?
    1. Gnome to start. first gnome panel show up, then the panel icons show up, one by one, then nautilus background picture, and at last the desktop icons show up sequentially (which is kind of annoying). If you want to give me a desktop, load it all into memory, then show it all at once, rather than giving me it piece by piece. I fart on this behaviour.
    2. KDE to load. It does however load it all at once, besides autostarted applications such as kmix yakuake etc etc. I liked it better before someone rearranged the startup scripts in 3.5.3 and made kde _seem_ start faster. It doesn't. You are only given a desktop before it's completely loaded. I also fart on this behaviour!
    i totally agree. the reason they added this stupid behaviour to KDE was because everybody said KDE was slow to start compared to Gnome and XP. but those two only SEEM to start faster, tough, on linux you can already start working when the desktop shows, which you can't on windows.
    lets hope KDE 4 is so much faster we won't notice this annoying thing anymore ;-)

  • What do you look for when buying a new printer?

    Ease of use and good drivers.
    Ever tried to use a Ricoh, Konica Minolta, or Kyocera MFP?
    Printers are stupidly emotive, get it wrong and it's like you've punched their kids or something.

    Hey guys, we are doing our first ever video meet up tomorrowabout printers. We are going to be talking withHPabout what the printer buying process is like for IT pros.What do you guys look for when you look at printers? Are there any must-have features?
    Definitely let us know below, we'll be discussing them on the show.Also for those interested in tuning in, it's a UK event so it's at2 PM GMT and 8 AM CT.But if that's too early for you, youcan also register to get a recording sent to you.Thanks y'all!
    This topic first appeared in the Spiceworks Community

  • What do you recommend for me: MacBook Pro, iMac or Mac Pro?

    I haven't decided what Mac I should buy. It's pretty hard for me. I'm fascinated with the iMac, MacBook Pro and Mac Pro. But I'm not sure what Mac is good for me. For now, I use my laptop for web browsing, sometimes photoshop and writing stories on notepad. But I'll probably do more later on such as developing 2D games and making music on GarageBand. I might make my own website with podcasts and possibly take advantage of Mac OS X's DVD creation software. I will also dual boot (Windows & Mac OS X which I'll use the most) and play games on it.
    Money isn't a real problem. I only have $1,000 at the moment. But I'm going to get a job soon. I won't buy a Mac until the job is stable.
    I don't know what to buy and not sure which one is the best for me. I like all 3 of them! I really like portability because I can take it anywhere. But I already have a notebook (not a Mac). I need a Mac that will last me a couple of years. Again, I'm afraid that newer stuff will come out and my computer will be inferior. lol.
    So I'm hoping someone can help me come up with a decision. You guys/gals know more about computers than me. I'm new to Macs too. I became interested in Macs last year when I saw the Power Mac G5. I thought the tower looked awesome and then I started playing around with it.

    I've never had an iMac wear out. My last one lasted four years and the guy who bought it from me on eBay reports that his is doing fine. It got HEAVY use in a dusty environment.
    And Apple has been refining the iMac for years now. I keep hearing you emphasize durability, so that is why I am pushing it for you. No laptop will last as long. They operate at higher temperatures and take a beating. My Mac Book Pro already lost its back-lighting and has something wrong with the DVD eject feature. All repairable for free with Applecare, which I recommend. But my iMac will outlast my desire to own it, this I know for certain. I have the 20 inch and wish I had gotten the 24. If you're interested in my new 20", I will sell it to you for 1/3 off what I paid for it, and it comes with a transferable 3 year Applecare warranty. This way I could purchase the 24". It hadn't come out when I got the 20".
    But first, come to the conclusion that you don't need an Apple laptop. That's the threshold decision.
    Best of luck to you.

  • What do you do for an error during updates?

    error occurs while attempting to read c:\windows\installer\itunes64.msi
    same error occurs while attempting uninstall

    I wonder if a couple of you would be kind enough to help me out?I have the research packet that I have to complete and they want me to interview a few professionals who would be responsible for hiring IT guys. The interview is only 4 questions and some basic info about you (Already public info, nothing personal).If you are willing to help me out, and I appreciate it, you could just respond to this thread or even message me if you don't want your stuff out in the public domain. So here it is:(Your Info)The company name that you work for / own:Your Name:Your Title:(The four questions)#1 - What type of training or education is needed to be considered for the position (Entry level - IT Admin, IS Manager, IT Tech, etc.)?#2 - What are the most important qualifications for these positions?#3 - What are some of the duties and responsibilities...
    This topic first appeared in the Spiceworks Community

  • What do you do for resource assignment reporting / checking ?

    I've been tasked with writing a set of reports, the purpose of which is twofold.
    Firstly, to help department managers make decisions on new requirements coming in
    Secondly, to help resource managers check their resources' assignments against previous months (we move the data date across a large multi programme environment at the end of each calendar month)
    Sometimes it can be hard to think outside of the way we work in our organisation, so throwing the question out - what do you and your organisation do?
    Points available for the best answers!
    David

    Another option is to generate SQL reports within the database.
    While I have never generated anything advanced we often run basic resource assignment reports to identify where a given resource is assigned:
    Generic example:
    SELECT a.task_code, a.act_end_date, b.proj_short_name, d.rsrc_short_name
    FROM TASK a, project b, taskrsrc c, rsrc d
    WHERE c.rsrc_id=2298
    AND a.task_id = c.task_id
    AND b.proj_id = c.proj_id
    AND d.rsrc_id = c.rsrc_id
    AND a.proj_id = b.proj_id;

  • What do you use for a To Do list?

    Curious to know what folks here use for a ToDo list. I'm seriously thinking of migrating from Outlook, which actually has a very good one. iCal's is okay, but it won't print out in the same order that it appears on the screen. (It's downright goofy to print out.)
    So I'm looking for alternatives.
    Any suggestions?
    Thanks in advance,
    rb

    What an interesting question. I have wondered this too. I have played with a few different ones. The one I have been trying for about a week is EasyTask (look it up on version tracker. Sorry, I do not know how to do links). You can use the demo indefinitely but you are limited to 15 tasks, I think it is about $20 to buy it. I like the way it allows me to sort and prioritize. It's based on Getting Things Done system.
    Another I have used is Check Off, which is very simple, but good. It is also freeware. Find it via VersionTracker too.
    I have also done a very simple template for myself just using Appleworks for printing out.
    A lot depends on what your individual needs are.

Maybe you are looking for

  • Taking long time to start when weblogic 11g admin server

    Hi When I ran following command in linux 64-bit environmnt to start weblogic 11g admin server, it is taking such a long time (some time it is taking one and half hour, some time it is taking 24 hours and still showing work under process) $HOME/Middle

  • Images do not display in Acmevideo sample application WebApp_8i.jws

    Hello, The JDeveloper 3 Acmevideo web application for Oracle8i is a nice-looking web application. There is a syntax fault in the Java source files WebAppReports.java, WebApp.java of the JDeveloper 3 workspace WebApp_8i.jws In the file acmevideo_deplo

  • Problem exporting XREF3 to excel

    hi all, i am trying to export BSEG data to excel.all other columns are ok, but the last digit in the value of column XREF3 is getting replaced with 0. for example if the value is 200750000004930001, the value in excel is 200750000004930000. same is t

  • Fuzzy, blurry display

    so, when I first got the computer I installed panther and everything was fine until the computer went to sleep. I woke it up and the display was sort of fuzzy and it got worse and worse. I restarted the computer and it was fine. I tried to find out w

  • FAQ: AVCHD MTS files

    We have heard from a number of users who have reported an inability to apply markers to AVCHD MTS files because the .mts files were moved out of the folder structure created by the camera. For example in this screenshot I demonstrate an MTS file that