What's new in security for BI NW04s

I have looked at the security model for BI NW04s and the only new things I can see are:
Improved User Management (more flexibilty of authorizations)
More granularity of ACLs (can now do at company).
....is that it or have I missed something?
Thanks
Patrick

Hi,
Chk this?
https://www.sdn.sap.com/irj/servlet/prt/portal/prtroot/docs/library/uuid/659fa0a2-0a01-0010-b39c-8f92b19fbfea
http://help.sap.com/saphelp_nw2004s/helpdata/en/8c/2ec59131d7f84ea514a67d628925a9/frameset.htm
http://www.sapbasis.org/BW_Security.htm
Regards,
Raj

Similar Messages

  • What's New in ICS for Sony Tablet S

    If you have any further questions please feel free to ask away. I will do my best to find the answer you are looking for!
    - Patrick
    Solved!
    Go to Solution.

    This video will show you what's new in ICS for Sony Tablet S.
    If you have any further questions please feel free to ask away. I will do my best to find the answer you are looking for!
    - Patrick

  • What is the best security for my imac

    i want to put some security on my imac late 2013 i been looking at 3 diff software norton internet security 5 for mac - intego premium bundle 2013 - Kaspersky Security for Mac i do alot buying on line and banking i work off wi-fi indoors which is password protected aol which is now talk talk can you tell me if any of them 3 are good and what one to pick or is there another one out there better then them can anyone help please.

    I see that others have already recommended my Mac Malware Guide, so I won't repeat that, or duplicate their advice.
    Regarding Norton and Kaspersky, you should absolutely avoid them. Norton isn't any good at detecting Mac malware, plus it's well-known for causing problems. Kaspersky is better at detections, but has also caused a number of problems from time to time.
    I want to like Intego's stuff, because I like the company, but I'm afraid their more full-featured stuff has been implicated in a number of performance problems and crashes in these forums over the years. For manual scans, though, you simply cannot do better than Intego's VirusBarrier Express, available for free in the App Store. And because it's from the App Store, it really can't cause any problems.
    Note that you need to be more concerned with other aspects of security, such as making sure your online accounts use strong passwords, and that you don't use the same password for more than one account. Be sure not to do any sensitive transactions on any third-party wifi network, especially one that doesn't require a password... only from home, on a network you control, or on some other network managed entirely by people you know and trust. Answers to any security questions on sensitive sites should be nonsensical, so that they cannot be guessed... for example, Q: "What city were you born in?" A: "flying purple people eaters". Keep an encrypted log of all these question-answer pairs. If two-factor authentication is offered, it's usually a good idea to use it.

  • Is there a "What's New" workspace available for PS CC 2014?

    .

    No, but Help menu > What's New will link you to the New Features webpage.
    Photoshop Help | New features summary

  • What ios4 new features work for us ipod touch 2nd generation 8gb user?

    hello all, here a list of the new features for the IOS4 taken from http://www.apple.com/iphone/softwareupdate/
    lets try to find out what works for us
    multitasking......NO (as per apple, not working)
    folders........?? (i dont know how to do that)
    even better email.......?? (i dont know how to do that)
    ibooks........?? (did not tested yet)
    create playlist........YES (i tested myself)
    5x digital zoom........NO (no camera, so no)
    tap to focus video.......NO (no camera, so no)
    faces and places in photos........?? (i dont know how to do that)
    home screen wall paper......NO (as per apple, not working)
    gift apps........?? (did not tested yet)
    spell checking.......YES (i tested myself in notes)
    wireless keyboard support......NO (as per apple, not working)
    so far
    create playlist and spell check is working
    Francois

    no, but i can try
    The curtain has been pulled back on iPhone 4, and the list of new features is massive: There's multitasking (finally!), a refreshed interface, and literally hundreds of other changes, all coming this summer. Here's the rundown.
    The new OS will ship in June (Fall for iPad, and a developer preview is available today, so we can expect to have plenty of apps updated and ready for launch.
    New Features: Multitasking, App Folders and More
    iPhone OS 4.0: The Best New Features
    • Multitasking: It's here, finally. It's handled with a simple task switcher: double click your home button, and you get a list of running apps. Select, switch, done. Multitasking is limited to audio streaming, VoIP and GPS apps, as well as a few other allowances: they can finish specific, important tasks in the background, for example. As far as non-music/nav/VoIP apps, those can be suspended in the background, but not left running. (See below.) Full details here.
    • Fast app switching: With iPhone 4's multitasking, most apps aren't actually running in the background—just certain functions of the app, like an audio stream or a GPS lock. But! All apps can now be frozen, in full, so that when you reopen them, they're restored to exactly the state they were in when they were closed.
    • Local notifications: Notifications can be sent between apps on the phone, not just from remote servers. In other words, if something important happens in an app you've opened and moved away from, a notification will pop up in whatever app you're using at the time, effectively saying "switch back to me!" It's a fairly clever way to keep track of multiple apps without the need for a start bar or dock-type interface. From Apple's dev guidelines:
    The advantage of local notifications is that they are independent of your application. Once a notification is scheduled, the system manages the delivery of it. Your application does not even have to be running when the notification is delivered.
    Apple's official line:
    iPhone OS 4's new multitasking offers users a new way to quickly move between apps, and provides developers seven new multitasking services to easily add multitasking features to their apps. These services include background audio, so apps like Pandora can play music in the background, and VoIP, so VoIP apps can receive a VoIP call even when the iPhone is asleep or the user is running other apps. iPhone OS 4 provides multitasking to third party apps while preserving battery life and foreground app performance, which has until now proved elusive on mobile devices.
    And some more technical details, again from Apple's developer guidelines:
    An application can request a finite amount of time to complete some important task. An application can declare itself as supporting specific services that require regular background execution time. An application can use local notifications to generate user alerts at designated times, whether or not the application is running.
    iPhone OS 4.0: The Best New Features
    • App folders: Now you can sort your apps into folders! That's homescreen clutter solved, just like that. Apple's description:
    Folders help users better organize and quickly access their apps. Simply drag one app icon onto another, and a new folder is automatically created. The folder is automatically given a name based on the App Store category of that app, such as "Games," which the user can easily rename. Using folders, users can now organize and access over 2,000 apps on their iPhone.
    2160, to be exact.
    iPhone OS 4.0: The Best New Features
    • A new Mail app: Unified inboxes, multiple Exchange accounts, fast inbox switching, threaded messages: These new features are actually a huge deal, since the iPhone's mail client has barely changed since 2007, and Apple doesn't allow alternative mail apps. Apple's pitch:
    iPhone OS 4 delivers the best mail experience on a mobile phone with its new Unified Inbox, allowing users to see messages from all their email accounts displayed together in a single inbox. With just a few taps, users can quickly switch between inboxes to see messages from any single account.
    iPhone OS 4.0: The Best New Features• iBooks: Oh hey, that iBooks ebook reader app and accompanying ebook store we first met on the iPad has ambled on down to the iPhone. Nice, since you can now take your books with you wherever you go, as oppose to wherever you go with your iPad.
    • Custom backgrounds: Jailbreakers have them. ****, the iPad has them. Now you can choose a persistent background for your iPhone—and not just for the lockscreen.
    • Game Center: Apple's going to roll out a centralized gaming service—a multiplayer network like PSN or Xbox Live—to help connect games to one another, by the end on the year. There are 3rd-party services that already do this, like OpenFeint. They will probably die. Full details here.
    iPhone OS 4.0: The Best New Features
    • iAd advertising: It looks like Apple's finally making use of Quattro, that mobile ad company it gobbled up a few months ago, by rolling out its own advertising platform, a turnkey ad plugin for app developers called iAd. The theory here is that instead of relying on links to external websites, which pull users out of apps whenever they tap on an ad, developers can use Apple's new tools to keep people in the app while still showing them advertising—sort of like popover browser windows. You can watch videos, play games, and even buy apps from within these ads. This is in the iPhone OS 4 developer tools, but it's not explicitly a part of OS 4, so you won't see apps with iAds until later this year. Full details here.
    • 5x digital zoom: Could this hint at a higher quality camera in the next hardware? 3.2 megapixels seems a bit low for 5x digital zoom.
    • Bluetooth keyboards: Another carryover from the iPad, Bluetooth keyboard support will finally come to iPhone 4.
    • A bevy of other new developer features, including 1500 new APIs to play with: See here for more details.
    The Hidden Features
    Now that we've had a few days to use the OS, we've compiled a huge list of features not covered in the keynote.
    Which Devices Get It, and When?
    iPhone OS 4.0: The Best New Features
    When the software ships in the summer, iPhone 3GSes and iPod Touch 3rd-gens devices will get all of the new features. The iPhone 3G and Touch 2G will get "many things," which doesn't include multitasking. I repeat: the iPhone 3G won't get multitasking, ever. iPhone 2Gs will be left on a hillside somewhere to die of exposure, or something.
    Apple didn't drop any clues about the next iPhone's hardware, but it's a fair bet that we'll see some changes come June.
    What About the iPad?
    iPhone OS 4.0: The Best New Features
    The iPad won't get the 4.0 upgrade until Fall of this year, a few months after the iPhone does. So, you'll be able to multitask on your dinky little iPhone before you'll be even be able to listen to Pandora and check your email at the same time on your giant iPad.

  • Can I find out what the New Features are for Updates?

    When the Application Manager says an Update is available, as far as I can see so far, it just says New Features.  Is there a web page that will give more details about what features etc. each update will provide?  The Application Manager is not showing file sizes AFAICT, and that's a consideration regards timing when you live in rural New Zealand. 
    Ahhhhh... hang on a moment.  Just remembered that I had to download the Photoshop CS6 update manually after a U44M1P7 error, and I still have that page marked:
    http://www.adobe.com/downloads/updates/
    But what about a nice friendly blog page?  Anything like that out there?

    Most updates are briefly described in the Cloud blog
    http://blogs.adobe.com/creativecloud/

  • Bridge CC - What's News (and Valid for Final Version)?

    Hi,
    with Photoshop CC, is there any important new development about Bridge CC? I am *mainly* interested in news concerning the final shipping versions available to everybody, not any pre-release versions for insiders.
    So far, regarding Bridge i collected these news around the web:
    - new support for retina displays
    - not automatically installed with Photoshop (fact probably only valid for pre-release versions of Photoshop CC)
    - comes without Output Module (for PDF and Web galleries) (fact probably only valid for pre-release versions of Photoshop CC)
    - Export Module changed or abolished (fact probably only valid for pre-release versions of Photoshop CC)
    - no more synchronised windows
    Thanks for all substantial facts about Bridge CC!

    Thanks for all substantial facts about Bridge CC!
    To my knowledge there can't be substantial facts until Bridge CC is official released which seems to be happening in the nearby future, out of curiosity, where did you gather this info? Around the web is a bit vague

  • What's new in `08 for GarageBand?

    Hi. What new in Garageband that would make it worth upgrading from version 3. Any tools, etc?
    Thanks!

    HangTime says:
    http://www.bulletsandbones.com/GB/FAQPages/WhatsNew08.html

  • ANN: New XDK release for 9.0.2B and 9.0.1.1.0A available

    New XDK Releases for 9.0.2B Beta Version and 9.0.1.1.0A Procudtion Version are online at:
    http://technet.oracle.com/tech/xml/xdkhome.html
    What's new:
    - Oracle9i XDK for C and C++ released on Linux
    - Oracle TransX Utility Aids loading data and text.These release is part of the XDK for Java 9.0.2 Beta.
    - Oracle SOAP APIs added to the XDK for Java
    Support for the SOAP services have been added to the XDK for Java 9.0.1.1.0A Production.
    - XML Schema Processor for Java supports both LAX Mode and STRICT Mode Validation
    The XML Schema Processor for Java now supports both LAX Mode and STRICT
    Mode Validation. Compared with STRICT Mode where every element from the root on down is required to be defined and validated, LAX Mode Schema validation provides developers the ability to limit the XML Schema
    validation to the subsections of the XML document.
    This will simplify XML Schema definitions and the validation process by skipping the ignorable content. Furthermore, with LAX mode, developers can divide their XML documents into small fragments and carry out the XML Schema validation in a parallel or progressive way. This results, in a much more flexible and productive schema validation process.
    - SAX2 Extension support in the Java XML Parser
    The XML Parser for Java now supports two new handlers - LexicalHandler and DeclHandler.
    XML documents now can be parsed through Oracle XML Parser SAX APIs with full access
    to the DTD declarations and the lexical items like comments and CDATA sections.
    This ensures that the complete content model is preserved.
    - JAXP 1.1 supports is now added to the XDK for Java
    - New Differ Bean in the XDK for JavaBeans
    A new bean has been added the the JavaBean XDK which analyses the differences between to XML documents and outputs the XSL sytlesheet that will convert one into the
    other. This is extremely useful when converting an XML document retrieved from a SQL query into an xHTML page on the web.
    Stylesheets can now be automaticly created for use in XSQL pages.
    - XML Compression now supported in the Java XML Parser
    Now developers can take advantage of a compressed XML stream when serializing their DOM and SAX outputs. This new functionality significantly reduces the size without losing any information. Both DOM and SAX compressed streams are fully compatible and the SAX stream can be used to generate a
    corresponding DOM tree. These compressed streams can also be stored in Oracle as a CLOB for efficient storage and retrieval.

    bump up for east cost.

  • What is the best security lock for the new 21 inch imac?

    I want to know what is the best security lock for the new 21 inch imac?

    Most computers refer to the locking attachment in some relationship to the name "Kensington", and that might be a useful clue.
    Following that, be sure to avoid counterfeit products. A well-known computer vendor (not Apple), was approached by a large purchaser (several tens of thousands of laptops) who insisted on using a counterfeit locking product that had a larger than normal locking tab. The vendor modified the tooling to accept the counterfeit product and, wouldn't you know it, the genuine product would no longer secure the computer properly.

  • What is the best security software for mac?

    I had Norton years ago but found it slowed things down unacceptably at the time and so have never revisited it since. However, as internet infection becomes more prevalent on Macs I am considering some kind of protection.
    1. What is the general feeling for the most optimal security software for Mac kit?
    2. Are there any side effects that one should be aware of which might affect the Mac or software operations?
    Thanks and regards

    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to log in to it remotely. That threat is in a different category, and there's no easy way to defend against it.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    ☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    ☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    ☞ It can easily be disabled or overridden by the user.
    ☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    ☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has so far failed to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. These failures don't involve App Store products, however.
    For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, and a technological fix is not going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the scam artists. If you're smarter than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
    ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software.
    ☞ Rogue websites such as Softonic and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    ☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    ☞ High-priced commercial software such as Photoshop is "cracked" or "free."
    ☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission.
    Conditional or unsolicited offers from strangers
    ☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    ☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    ☞ You win a prize in a contest you never entered.
    ☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    ☞ Anything online that you would expect to pay for is "free."
    Unexpected events
    ☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
    ☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    ☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    ☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" (AV) or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    ☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    ☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    ☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    ☞ Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in every email attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It's as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • What is the best security package for an imac using yosimity

    What is the best security package for an imac using Yosimity

    Mac users often ask whether they should install "anti-virus" software. The answer usually given on ASC is "no." The answer is right, but it may give the wrong impression that there is no threat from what are loosely called "viruses." There  is a threat, and you need to educate yourself about it.
    1. This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to take control of it remotely. That threat is in a different category, and there's no easy way to defend against it.
    The comment is long because the issue is complex. The key points are in sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
    The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    ☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    ☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    ☞ It can easily be disabled or overridden by the user.
    ☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    ☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    Apple has taken far too long to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. Those lapses don't involve App Store products, however.
    For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, not machine behavior, and no technological fix alone is going to solve it. Trusting software to protect you will only make you more vulnerable.
    The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and Internet criminals. If you're better informed than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices. How do you know when you're leaving the safe harbor? Below are some warning signs of danger.
    Software from an untrustworthy source
    ☞ Software with a corporate brand, such as Adobe Flash Player, doesn't come directly from the developer’s website. Do not trust an alert from any website to update Flash, or your browser, or any other software. A genuine alert that Flash is outdated and blocked is shown on this support page. Follow the instructions on the support page in that case. Otherwise, assume that the alert is fake and someone is trying to scam you into installing malware. If you see such alerts on more than one website, ask for instructions.
    ☞ Software of any kind is distributed via BitTorrent, or Usenet, or on a website that also distributes pirated music or movies.
    ☞ Rogue websites such as Softonic, Soft32, and CNET Download distribute free applications that have been packaged in a superfluous "installer."
    ☞ The software is advertised by means of spam or intrusive web ads. Any ad, on any site, that includes a direct link to a download should be ignored.
    Software that is plainly illegal or does something illegal
    ☞ High-priced commercial software such as Photoshop is "cracked" or "free."
    ☞ An application helps you to infringe copyright, for instance by circumventing the copy protection on commercial software, or saving streamed media for reuse without permission. All "YouTube downloaders" are in this category, though not all are necessarily malicious.
    Conditional or unsolicited offers from strangers
    ☞ A telephone caller or a web page tells you that you have a “virus” and offers to help you remove it. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    ☞ A web site offers free content such as video or music, but to use it you must install a “codec,” “plug-in,” "player," "downloader," "extractor," or “certificate” that comes from that same site, or an unknown one.
    ☞ You win a prize in a contest you never entered.
    ☞ Someone on a message board such as this one is eager to help you, but only if you download an application of his choosing.
    ☞ A "FREE WI-FI !!!" network advertises itself in a public place such as an airport, but is not provided by the management.
    ☞ Anything online that you would expect to pay for is "free."
    Unexpected events
    ☞ A file is downloaded automatically when you visit a web page, with no other action on your part. Delete any such file without opening it.
    ☞ You open what you think is a document and get an alert that it's "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you should still delete any file that isn't what you expected it to be.
    ☞ An application does something you don't expect, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    ☞ Software is attached to email that you didn't request, even if it comes (or seems to come) from someone you trust.
    I don't say that leaving the safe harbor just once will necessarily result in disaster, but making a habit of it will weaken your defenses against malware attack. Any of the above scenarios should, at the very least, make you uncomfortable.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it—not JavaScript—in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a padlock icon in the address bar when visiting a secure site.
    Stay within the safe harbor, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" (AV) or "Internet security" products for the Mac, as they are all worse than useless. If you need to be able to detect Windows malware in your files, use one of the free security apps in the Mac App Store—nothing else.
    Why shouldn't you use commercial AV products?
    ☞ To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. This technique is a proven failure, as a major AV software vendor has admitted. Most attacks are "zero-day"—that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry is coming to the realization that traditional AV software is worthless.
    ☞ Its design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere. In order to meet that nonexistent threat, commercial AV software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    ☞ By modifying the operating system, the software may also create weaknesses that could be exploited by malware attackers.
    ☞ Most importantly, a false sense of security is dangerous.
    8. An AV product from the App Store, such as "ClamXav," has the same drawback as the commercial suites of being always out of date, but it does not inject low-level code into the operating system. That doesn't mean it's entirely harmless. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An AV app is not needed, and cannot be relied upon, for protection against OS X malware. It's useful, if at all, only for detecting Windows malware, and even for that use it's not really effective, because new Windows malware is emerging much faster than OS X malware.
    Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else. A malicious attachment in email is usually easy to recognize by the name alone. An actual example:
    London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe
    You don't need software to tell you that's a Windows trojan. Software may be able to tell you which trojan it is, but who cares? In practice, there's no reason to use recognition software unless an organizational policy requires it. Windows malware is so widespread that you should assume it's in every email attachment until proven otherwise. Nevertheless, ClamXav or a similar product from the App Store may serve a purpose if it satisfies an ill-informed network administrator who says you must run some kind of AV application. It's free and it won't handicap the system.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have all the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user, you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither can you assume that you will always be safe from exploitation, no matter what you do. Navigating the Internet is like walking the streets of a big city. It can be as safe or as dangerous as you choose to make it. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • What is the recommended security software for MacPro? I am getting popups, including offer to sell Mac Sheild. Is this legit?

    What is the recommended security software for MacPro? I am getting popups, including offer to sell Mac Sheild. Is this legit?

    No, it is not legit, it's a scam. Avoid such popups and DO NOT under any circumstances fall for any claims that your system has been infected by viruses and download any of this "scareware". See:
    http://support.apple.com/kb/HT4650
    For additional information, see also:
    http://www.reedcorner.net/news.php/?p=138  
    http://www.reedcorner.net/guides/macvirus/  
    If you do a forum search on Mac Defender, Mac Protector or Apple Security Center (this fake has a lot of different names) you will also find a lot of threads about this.
    The most recommended "security software" is "none", beyond common sense and normal caution. If you do, however, decide you wish to run antivirus software, I think that the donationware clamXav should be more than enough provided you remember to scan your system from time to time. iAntivirus has also been recommended by others, though I have no personal experience with it.
    If you are running Windows on your system, either via BootCamp, Parallels Workstation or another solution, then that copy of Windows is subject to all the myriad exploits common to the Windows world, so you need to take full precautions, including running both antivirus and antispyware software.
    Regards.

  • Hi i got a new airport express for christmas and i set it up as per instructions ,i even give a static ip and wpa2 security ..the problem is is when i come to want to use it it says its not on my network and a orange triangle shows .when i reboot it works

    hi i got a new airport express for christmas and i set it up as per instructions ,i even give a static ip and wpa2 security ..the problem is is when i come to want to use it it says its not on my network and a orange triangle shows .when i reboot it works..then if i leave it a while and try iy agian its disapeared of my network...i have a bt hub 3 ....any help please ..im not sure if itsa faulty express

    I really don't have an answer for that one. I guess that while trying to get things working correctly, I would use the most basic monitor I had which in your case would be the Eizon using the Thunderbolt port and adaptor.
    When you boot into Safe Mode the startup is quite slow, but you should get the Apple logo and then the spinning gear below it (release the SHIFT key when it appears.) Then after a little more time you should see a gray progress bar appear below the spinning gear. When that disappears the computer will startup to a login screen.

  • I started with one itunes account for my iphone and ipad, and now have a second ipad linked to the same itunes.  Can I set up a new itunes account for one ipad without losing what has already been downloaded on it?

    I started with one itunes account for my iphone and ipad, and now have a second ipad linked to the same itunes.  Can I set up a new itunes account for one ipad without losing what has already been downloaded on it?  I want to stop my husbands downloads appearing on my ipad, and vice versa.

    A much simpler solution would be to go into Settings > Store and turn off Automatic Downloads

Maybe you are looking for

  • Closing stock of co.code

    How to find out closing stock of plants belongs to one co.code on particular date.

  • BUG : Can't change properties (font, size, etc.) in Text Box (Acrobat Pro Extend 9.3.4)

    Here is a bug in Acrobat 9. It's really frustrating : 1- Open any PDF file. 2- Select the Text Box tool and type something. 3- Notice that you can change the font using the Properties toolbar (CTRL + E). 4- Open a second PDF file. 5- Select the Text

  • Dual Layer DVD - Formatting Failed

    I've bene trying to format a dual layerDVD project for the past few hours and I keep getting a Formatting Failed" message and Layer 1 cannot exceed Layer 0 for a OTP disc. I've tried shifting the layer break point all over the place to no avail - is

  • Browser Incompatibility

    Hi; How is it that my swf files are suffering from browser incompatibilities? How do I rectify the situation? I'm frankly surprised to encounter this issue, since I would have thought a swf file would be generated such that it wouldn't have these pro

  • Variable Select

    I have a question regarding a select that requires a lot of variability. I am looping at an internal table and comparing each record within that to the results from a function module which I just processed. It looks something like this: LOOP AT ITAB1