What router for MacBook

I will be visiting Ohio soon where my daughter has broadband, what router do I need to purchase in order to work wirelessly through her broadband? I have checked the Apple store online but its totally confusing as to what I need, any help greatly appreciated.

many routers by many manufacturers can be read and connected to via WiFi with your MacBook. I think there needs to be a host computer for the network you would make. And for all you know, there might be an unsecured, wireless network you can just read off of.

Similar Messages

  • Time Capsule as router for MacBook and Dell PC?????????

    I am sick of my Dell Inspiron computer and have made the decision to switch to an Apple MacBook Pro. I just purchased a TIME CAPSULE Hard Drive for backing up my system and want to be able to use it as the router for both the MAC and my PC until I am ready to DROP KICK my Dell Inspiron 6000 computer. I have not been able to get on the internet with my PC using Time Capsule as my wireless router. I have an msn e-mail address and have not been able to get my e-mail on the MacPro using my msn e-mail address. Is there a compatibility issue that I am seeing .will someone HELP me with this problem because it is driving me INSANE!!!!!!!!!

    use firefox on the mac to get your msn mail. I'm new to the mac as well and found that firefox will allow hotmail and msn email.

  • Router for macbook

    What is the best and most reliable wireless router to buy for a macbook?
    Macbook   Mac OS X (10.4.6)  

    Hi All
    I have the Netgear WGU624 router (108 mbs speed) that was already setup on an existing PC Network in my home using WPA encryption.
    http://www.netgear.com/products/details/WGU624.php
    In the last 2 months I have networked in both a MacBook and a MacBook Pro right out of the box during initial setup with no trouble at all. This router cost about $75 at CompUSA. I have excelelnt reception all over the house even with the router not being centrally located.
    I have been very impressed with Netgear's products and they cost less than the other brands
    d
    MacBook Pro 15" 2.16GHZ, 2GB & MacBook, Black, 2GHZ, 1GB   Mac OS X (10.4.6)   iPOD 60GB, iPOD 30GB, & 2 eMachine Desktops

  • Best Wireless router for Macbook?

    I currently have a linksys wireless router, which I'm beginning to find out will not support my Macbook in using the wireless airport network I have.
    Has anyone used another wireless router (other than Airport/Airbase) that works well and is easy to install for wireless connections?
    All suggestions welcomed and appreciated.
    Thanks!

    You asked which is the "best." That would be the Airport Extreme Base Station.
    All third party routers should work, and they are all pretty easy to install if you read the user manuals.
    You did not tell us what LinkSys model you have, but most of their routers have worked well with Macs. It's possible you may only need a firmware update for the router. Check with LinkSys. Also check with their tech support to see if they have a solution for you.

  • Best wireless router for MacBook pro

    I have a new MacBook pro. I've been online (wirelessly) for weeks but now I can't get online, or if I do, I get kicked off if I try to change pages. We have several iPads which I'm on now, several windows based laptops, and a windows pc. The wireless router is plugged into the pc. Everything but the pc has problems getting online and staying online but now the Mac is the only one that cant. I've reset the router, changed ports, restarted everything so many times I can do it in my sleep. We have D-link as the router. I'm thinking that's the problem but it's only 9ish months old and has been working until now. We have comcast. Help!

    Thanks everyone for responding!
    I asked one of the workers at Best Buy about wireless routers and he suggested this one or D-Link. As well, he mentioned that it didn't really matter on what brand it was but I trust Linksys since it is with Cisco. I had a Cisco computer before I got into college with a mac.
    I ended up buying a Linksys E2000. I live in residence so it made sense for me to get that one. It was an easy set up and really fast. The E2000 is 1 level higher than the E1000. In the beginning the guy suggested the E2000 but I asked if I were to get a higher one, he suggested E2000. It took about maybe 5-10 mins to completely set it up.
    Message was edited by: Joy Chuang

  • What cable for macbook pro needed to connect with LCD projector

    I ordered a Mini DVI to VGA adapter, but it doesn't fit into my laptop. What connection do I need for a connection

    if you do not have a Mini DVI, that leaves only about 80 models of MacBooks.
    Which one do you own?

  • Wireless cable modem/router for macbook pro?

    My parents just bought a Macbook Pro (their first Mac!) and would like to connect it wirelessly to the internet through high-speed cable (they already have cable TV in their house). Are there cable modems available with built-in wireless capability, or should they get a separate cable modem and wireless router (like I'm using for my Powerbook)? I want to make sure that they have WPA2 security. Can someone offer recommendations for which networking hardware to purchase? Thanks.
    Paul

    The AEBS is a wireless router, not a cable modem. A good cable modem is the Motorola 5120 but it is not wireless.
    Yes, the AEBS is pricey but it's an excellent product. However, if you wish not to spend that kind of money there are less expensive products by LinkSys, Belkin, D-Link and others. However, none have any Mac support although most all of them will work with Macs - some better than others.

  • What SSD For Macbook Late 2007

    Hi all.
    As a second Mac ive just bought a second hand Macbook 2.2Ghz Core2Duo late 2007 model odd a friend for a very reasonable price.
    Ive already ordered some RAM to max it out as it only has the stock 1GB and 160Gb HDD. to go with the ram i would like to upgrade to an SSD drive and am aware that this model is a Sata I connection at 1.5Gbps throughput. As most drives are now Sata II or III am i ok buying one of these? Im only after a circa 128Gb SSD as will be plenty for my needs. Im a uk based user and am a graphic designer so this machine will be mainly a web machine for net use with light photoshop/illustrator/indesign use.
    Im currently running Snow leopard on it and intend to keep it that way, unless ML would give me speed increases on a machine of this era?
    Crucial states their M500 Sata III drives are compatible, so am i wright to assume any Sata II or III drive will be ok?
    Any help and recomendations are very much appreciated and i thank you kindly in advance!
    Rob

    Mike,
    Funny you ask, as when you posted that i was actually out buying the Samsung 840 120Gb SSD.
    Basically the Macbook i picked up cheap off a mate was new to me last week. Came from a very particular owner that looks after things extremeley well. Its a 2007 2.2Ghz 3.1 model that ive upped to 4Gb RAM, and had wiped clean and reinstalled a fresh copy off snow leopard onto.
    So today i came home with said SSD, and earlier this morning i had cloned the fresh install onto a firewire 400 drive ready to go. The 840 aleready had the latest firmware revision listed on Samasungs website, so i went ahead and removed the 5400rpm HDD it had from new, put the SSD in (never done one before and was surprised just how easy this was).
    Then i booted up off my external drive, and the OS advised it could see the internal SSD but could not write to it - did i want to initialise. So after i clciked yes, i was able to erase and restore from my external back to the SSD. It has then booted up fine from the inmternal, taking longer on the first boot (i beleive this is normal). I installed and turned on the 'Enable Trim' app and rebooted twice. the second time getting a significant increase in boot time and all apps.
    System profiler shows TRIM support on and the up to date firmware revision.
    Snappy snappy! And my favourite new feature of the SSD? the fact that i feel no vibration when on my lap! Oh and the speed.
    So yes, this Sata III drive seems to be fully fuctional on a Sata I interface, and although not as fats as newer Sata II and III machines, i feels alot snappier than before. And cooler as well. havent heard the fan so far since cloning back.
    And thanks for your help and input earlier in the post!
    The guy in the shop advised me it wouldnt work in my Mac (dumb-***) although i had specifically searched out product reviews that people had said had had success on Sata I and II machines of this vintage.

  • What router for my 2010 13" MBP?

    I have a 2006/7 Netgear router which is spotty.  I do not think my MBP will work with the newer routers supporting 802.11ac, so what is the best router I CAN buy to help improve my wireless experience? I also need to support: 3 iPads (~2012/13), 3 iPhones, 2 iPods, XBOX and one Dell PC.  I thought the DLink DIR 655 might be good, but is that now outdated as well? I really appreciate the help!!!

    I do not think my MBP will work with the newer routers supporting 802.11ac
    It will. It just won't work at the highest speed the router is capable of.

  • What is APP FOR MACBOOK PRO - COL/AE-ZML?

    ihave just received an invoice and would like to know what APP FOR MACBOOK PRO - COL/AE-ZML is for. im sorry if this is a silly question. i dont have the macbook pro yet but im just curious as to what it is?

    It probably has to do with the shipping. However why not contact the invoice sender and ask them what their codes represent?

  • Best router for a macbook experiencing connection timeouts?

    Hi all,
    I know macbook wireless connection issues have been discussed to death already, but I have a slightly different question and with Black Friday looming, I was hoping to get some input from those who may have had success with finding a new router. I apologize for the incoming wall of text, it's been a long, arduous journey.
    My 2007ish Macbook ceased to be wireless over a year ago, at least at home.  I was on Snow Leopard at the time, and using the internet when it dropped suddenly but connected after a restart. It dropped several more times and each time would require more restarts. By the end of the day, it didn't see my router, nor the neighbors' forever unsecured linksys router (yet i've had to go to war defending our network from their 17 year old son) or any other nearby network. I'm no longer 100% certain, but I do believe there had recently been an update (wifi died around July 4th 2011 if anyone is an obssessive date keeper) In the next days I installed kismet and istumbler and took the macbook for a drive around the neighborhood, where it proceeded to detect all kinds of other networks that it had never seen before (like, ever because its out of range). At home, still nothing.
    Over the next few months, I furiously googled for hours upon hours and tried everything I came across.  And I do mean everything, even things I consciously knew would not have any affect. I did a clean install of Lion but no change. It's been to the apple store three times, where of course it detected their network and connected with no hesitation and diagnostics showed it maintaining better signal strength than I can ever remember seeing at home. They gave me various suggestions, from the predictable 'replace wireless card' to the ludicrous 'send it off and have the antennae replaced' which would be $800 dollars because they would need to open the screen part.  Yeah..no.  At least they replaced my swelling battery and top case for free.  Anyway, thenceforth I remained chained to my desk by ethernet. 
    Fast forward to now.  Still chained to the desk, but more determined than ever to do something about it. About a month ago I gave it another go and eventually after a few adjustments it started to actually detect the router and I can click to connect, enter the password, but of course, connection timeout. So the network name sits there in the dropdown menu, but bars all greyed out. Very frustrating. 
    So as a last ditch effort, I have decided to try replacing our router, a Linksys WRTP54G that is infuriatingly locked to Vonage, which we no longer have. There's a motorola surfboard modem connected to the router, and a switch between the router and macbook. The switch isn't the problem, it wasn't even there when the problem started. I've also tried a WRT54G which didn't work either. The Macbook works fine on a university network, but I don't have access to any of the specifics about the network. It also connects to a plethora of other home networks and routers, some of which I do believe are b/g routers.
    We're due for a more powerful, capable, and not-cursed-by-vonage router anyway as our devices have increased in number from 4 to nearly 13. I want one that can support NAS and if possible Open WRT.  I was also planning to move us behind a VPN very soon.  I know that's maybe getting a bit nitpicky, but I am definitely prepared to pay more if it means the Macbook is wireless and I can clear up the 20ft river of chords snaking not so subtly around our upstairs.
    So the question is, has anyone had any luck fixing the problem by replacing the router?  Even if it doesn't have tons of features, any input on what kinds of routers seem to make Macbooks with this problem fall in line would be so helpful!!

    Apple AirPort Extreme has served my mixed environment very well. You can buy a refurbished one from Apple and save some $.
    http://store.apple.com/1-800-MY-APPLE/WebObjects/AppleStore.woa/wa/RSLID?mco=AA9 C1548&nclm=CertifiedMac

  • What is the best antivirus for MacBook Pro?

    What is the best antivirus for MacBook Pro?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. OS X security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. XProtect, Gatekeeper, and MRT reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use one of the free anti-virus products in the Mac App Store — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. An anti-malware product from the App Store, such as "ClamXav," doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An anti-virus app is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    Anti-virus software may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use the software unless a network administrator requires you to do it.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer is going to be infected every time you install an application, read email, or visit a web page. But neither should you have the false idea that you will always be safe, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • Recommendations:Wireless Router Broadband over phone for Macbook (white)

    Can you please offer advice about buying a wireless router for my new Macbook?
    I have been using old fashioned cables and a speedtouch modem on my eMac up to now.
    Buying the Macbook has pushed me into the 21st century and I'm getting my head around wireless and what I need to do to connect to the internet.
    What are good buys for wireless routers?
    I have a broadband connection using the landline.
    I am looking for the most user friendly solution please!

    Have purchased the Modem/router supplied by ISP.

  • My First MacBook Crashes The Entire Network (Router) for Everyone?

    Hi,
    I've spent the past 2 days on my first MacBook ever, struggling to keep the Internet active.
    I've never had this problem before and it started when I brought this new MacBook home.
    Basically what happens is when I start up the MB and it automatically connects to the Wireless Network, the entire Internet connection (router) drops and crashes and the only way to restore it, is to shut down the MacBook and thereafter reboot the Router.
    If you start up the MacBook again, the same events follow; massive internet crash across the network and then you hear people screaming and shouting that the internet crashed.
    I've done plenty research, and nothing seems to work.
    I've found a bit of information on MTU and modifying the values. In the 2 days I've had this Mac, I've tried every value below 1500 on the Router and MacBook, (including 1492; 1400; 1352; 1450 etc) and can't keep the MacBook to save the Value under Ethernet?? Is this a Snow Leopard bug? When it does decide to save; it resets back to Manual - Standard 1500. It's frustrating, because I moved from Windows to Mac to get away from bugs and incompatibilities and guess what; First day I encounter massive inefficiencies due to Mac
    I've had a little success; when the Mac does save the MTU in Ethernet for a session (not permanent after a restart for some weird reason); I am able to browse the internet for 10 - 20 minutes though another Access Point on MTU Values on 1420; 1428; 1436 and thats it. The internet crashes.
    I've also tried to disable IPv6 and manually set DNS servers and IP's (automatic/static). No success.
    Please help, this is not the greatest introduction to the Mac life, and I want is the internet connection to remain stable for everyone.
    My Hardware is as follows:
    MacBook Air (2010) 265GB
    DLINK DSL-2650U Wireless G ADSL2+ Router
    Any help is greatly appreciated.

    It doesn't seem to be just D-Link routers.
    I'm having a similar problem with an older Belkin model, running DD-WRT firmware, and two different 2010 model MacBook Pros. Heavy upload traffic can cause the wireless access point to lock up.
    A friend just told me today that he's having the problem with a Linksys model, running normal firmware, and older model MacBook Pros. Heavy upload traffic (Time Machine backups, in his case) causes his access point to lock up.
    (There's a lot of discussion threads about Wireless access problems, but most seem to be of the computer stops talking to wireless network variety. This problem my friend and I are having - which sounds like yours too - definitely seems to be breaking the network for everyone.)

  • What virus scan software is safe for MacBook?

    Is there a 3rd party virus scan software that is safe for MacBook?

    Mac users often ask whether they should install "anti-virus" (AV) software. The usual answer is "no." That answer is right, but it may give the wrong impression that there is no threat from what are loosely called "viruses." There is a threat, and you need to educate yourself about it.
    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions.
    It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to take control of it remotely. That threat is in a different category, and there's no easy way to defend against it. AV software is not intended to, and does not, defend against such attacks.
    The comment is long because the issue is complex. The key points are in sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    ☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    ☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't been checked for security by Apple unless it comes from the App Store, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    ☞ It can easily be disabled or overridden by the user.
    ☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    ☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has taken far too long to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. Those lapses don't involve App Store products, however.
    For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, not machine behavior, and no technological fix alone is going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and Internet criminals. If you're better informed than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software. A genuine alert that Flash is outdated and blocked is shown on this support page. Follow the instructions on the support page in that case. Otherwise, assume that the alert is fake and someone is trying to scam you into installing malware. If you see such alerts on more than one website, ask for instructions.
    ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
    ☞ Rogue websites such as Softonic, Soft32, and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    ☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    ☞ High-priced commercial software such as Photoshop is "cracked" or "free."
    ☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission. All "YouTube downloaders" are in this category, though not all are necessarily malicious.
    Conditional or unsolicited offers from strangers
    ☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    ☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    ☞ You win a prize in a contest you never entered.
    ☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    ☞ Anything online that you would expect to pay for is "free."
    Unexpected events
    ☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
    ☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    ☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    ☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a padlock icon in the address bar when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial AV or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    ☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    ☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    ☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    ☞ Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in every email attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It can be as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

Maybe you are looking for

  • Rectifications of different sizes for all the three table lines in footer.

    Hi friendz,                 i am working in ecc6 system(smartforms).                 i am using 3 table lines in the footer one for total, the second one for tax calculation, and the third one for the grand total. But in the output screen display - t

  • Additional Columns in Appraisal Template

    Hi, I am currently creating a template similar to MBO in PHAP_CATALOG_PA. Can i add additional columns in the template. Is there any configuration step to add additional column and give a column header name. For example: See Below, I require first co

  • CODE SIGNING errors

    I've been notiching a number of "CODE SIGNING" errors on my MacBook Pro. I'm not sure when exactly these started and they're not really affect the system, however I'd really like to find out the root cause. Here's the relevant dmesg entries: CODE SIG

  • Customer Address Data

    Hello I am trying to extract customers from ECC to MDM using XI I am sending the DEBMDM idoc but it doesn't contain the adress data E1KNB1M doesnt have the STRAS field when I check on SE16 the KNA1 table I see the adresses of all the customers any id

  • Grey screen with Reader 11.0.10

    I am getting a grey screen when I download some documents using Reader 11.0.10. How can I fix this? Regards