{"id":850,"date":"2017-01-13T16:14:10","date_gmt":"2017-01-13T14:14:10","guid":{"rendered":"https:\/\/community.virtono.com\/?p=850"},"modified":"2017-01-13T16:14:10","modified_gmt":"2017-01-13T14:14:10","slug":"how-to-work-your-mac-security","status":"publish","type":"post","link":"https:\/\/www.virtono.com\/community\/knowledgebase\/how-to-work-your-mac-security\/","title":{"rendered":"How to Work your Mac Security."},"content":{"rendered":"<p>Apple&#8217;s Iphone Celebrated its 10th anniversary, so I&#8217;ve decided to articles, focusing on Apple&#8217;s product.<\/p>\n<p>I hope you will enjoy these, readers.<\/p>\n<p>So, how exactly you work security on your Mac, here is how.<\/p>\n<p><strong>Enable the OS X firewall<\/strong><\/p>\n<p>The firewall in OS X is a network filter that\u00a0allows you to control which programs and services can accept incoming connections. While classic firewalls do this on a per-port basis, OS X\u2019s can work\u00a0on a per-application or per-service basis, giving you more flexibility. To set up your firewall, go to the Security &amp; Privacy system preferences, click on the Firewall tab, and then unlock\u00a0the preference pane, after which you will be able to click the Turn On Firewall button. This basic option is the best for most purposes, but you can also click the Firewall Options button to see the specific settings for each application, as well as access some extra features, such as stealth mode and an option for blocking all connections. The firewall is a good option to enable if you\u2019re connected to a public Wi-Fi network, such as one at a cafe, library, or other hotspot. For home networks, you can usually rely on your router\u2019s firewall for protection, though, enabling the OS X\u00a0firewall for added security generally won\u2019t cause additional problems.<\/p>\n<p><strong>Enable FileVault<\/strong><\/p>\n<p>FileVault is the full-disk encryption routine in OS X that will secure all files on the drive. To enable it, go to the FileVault tab\u00a0of the Security &amp; Privacy system preference, unlock the preference, and click Turn On FileVault. When you do this you\u2019ll be asked to choose the user accounts that are authorized to unlock the disk. Click Continue and your Mac will\u00a0begin encrypting your drive. Full disk encryption is primarily useful for protecting a stolen Mac. When your drive is unlocked, files on it can be read. However, before it\u2019s unlocked, all data on the drive will be scrambled. This prevents data recovery by unauthorised third parties, who might try to access it using Target Disk mode on your Mac or by<br \/>\nremoving your Mac\u2019s hard drive and attaching it to another computer.<\/p>\n<p><strong>Password management<\/strong><\/p>\n<p>If you use numerous online services regularly, then you will (or should) have different credentials for each one. These may be difficult to remember. In OS X, you have a built-in alternative for managing passwords called the keychain. The keychain is enabled by default to store your various passwords for online services, email accounts, and other authentication routines. Whenever you see a checkbox for saving your password, or in a drop-down menu when using Safari, this is OS X asking you to store these passwords in an encrypted file called the login keychain. This can be managed using the Keychain Access utility (\/Applications\/ Utilities). In most cases, there\u2019s little need to use this. Instead, use the option to save your passwords and OS X will automatically enter them when needed.<br \/>\n<strong>Locking and locating<\/strong> A final couple of options for protecting your Mac include securing your computer when you have to leave it unattended<br \/>\nMac security options Topher Kessler reveals the four Mac security options everyone should know<br \/>\nand enabling remote access to it \u2013 not only to interact with it from afar, but also to track and lock it down, if needed. You set up the first of these options in the General tab of the Security &amp; Privacy system preference. Just enable the Require Password option and choose Immediately or five seconds from the pop-up menu and you\u2019ll be required to enter a password to use your Mac after it\u2019s gone to sleep or the screen saver has started. The shorter the time interval you use in this feature, the better. Just close the lid to lock the system. For Find My Mac, if your system is ever stolen you can log into iCloud.com or use the Find My iPhone app on an iOS device to locate your device, send it a command to lock it down unless a password is supplied, have it issue a sound (also a great option for locating a misplaced iOS device), or remotely wipe the device. Overall, while Apple can do very little to prevent your computer from being stolen, OS X does its best to protect the data it holds as well as offers a chance that you can pinpoint its location. With these options enabled, you can be sure your Mac\u2019s data is as safe as possible, with little to no inconvenience for you.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apple&#8217;s Iphone Celebrated its 10th anniversary, so I&#8217;ve decided to articles, focusing on Apple&#8217;s product. I hope you will enjoy these, readers. So, how exactly you work security on your Mac, here is how. Enable the OS X firewall The firewall in OS X is a network filter that\u00a0allows you<\/p>\n","protected":false},"author":3,"featured_media":851,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[25,5],"tags":[],"class_list":["post-850","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-and-technology-news","category-knowledgebase"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/mac-733178_960_720.jpg?fit=960%2C637&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7ISfL-dI","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":813,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/firewall-what-how-hardware-vs-software-firewall\/","url_meta":{"origin":850,"position":0},"title":"FIREWALL | What? How? | Hardware vs. Software Firewall","author":"Daniel Draga","date":"December 14, 2016","format":false,"excerpt":"Firewalls are basically a barrier between your computer (or a network) and the Internet (outside world). A firewall can be simply compared to a security guard who stands at the entrance of your house and filters the visitors coming to your place. He may allow some visitors to enter while\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/12\/firewall-security.jpg?fit=610%2C458&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/12\/firewall-security.jpg?fit=610%2C458&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/12\/firewall-security.jpg?fit=610%2C458&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":903,"url":"https:\/\/www.virtono.com\/community\/tutorial-how-to\/how-to-install-and-configure-csf-config-server-firewall-on-centos-7\/","url_meta":{"origin":850,"position":1},"title":"How to Install and Configure CSF (Config Server Firewall) on CentOS 7","author":"Daniel Draga","date":"April 11, 2017","format":false,"excerpt":"ConfigServe Firewall, also known as CSF, is a firewall configuration script created to provide better security for your server while giving you an easy to use, an advanced interface for managing your firewall settings. CSF configures your server\u2019s firewall to lock down public access to services and only allow certain\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":3947,"url":"https:\/\/www.virtono.com\/community\/tutorial-how-to\/how-to-install-configserver-security-firewall-csf-on-almalinux\/","url_meta":{"origin":850,"position":2},"title":"How to install ConfigServer Security &#038; Firewall -CSF on Almalinux","author":"George B.","date":"September 28, 2023","format":false,"excerpt":"In this guide, we will walk you through the step-by-step process of installing CSF on AlmaLinux, ensuring that your system is fortified against potential threats. Every system administrator has a responsibility to protect their server from potential attacks and vulnerabilities. ConfigServer Security & Firewall (CSF) is a strong tool that\u2026","rel":"","context":"In &quot;Tutorials&quot;","block_context":{"text":"Tutorials","link":"https:\/\/www.virtono.com\/community\/category\/tutorial-how-to\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/09\/How-to-install-CSF-on-Almalinux.png?fit=360%2C240&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":880,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/linux-securityfirewalls\/","url_meta":{"origin":850,"position":3},"title":"Linux Security:Firewalls","author":"Daniel Draga","date":"January 25, 2017","format":false,"excerpt":"Security is an important but complex topic. So I'll be doing a series of articles, focusing on the principles and working of security of Linux. The challenge is that it\u2019s an ever-changing idea. Software we think of as secure can become insecure as hackers figure out how to break though\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/firewall-hacker-720x380.jpg?fit=720%2C380&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/firewall-hacker-720x380.jpg?fit=720%2C380&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/firewall-hacker-720x380.jpg?fit=720%2C380&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/firewall-hacker-720x380.jpg?fit=720%2C380&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":873,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/hardening-linux\/","url_meta":{"origin":850,"position":4},"title":"Hardening Linux:OS Hardening Principles","author":"Daniel Draga","date":"January 20, 2017","format":false,"excerpt":"Hardening Linux and Using iptables There's tremendous value in isolating your bastion (Internet-accessible) hosts in a DMZ network, protected by a well-designed firewall and other external controls. And just as a good DMZ is designed assuming that sooner or later, even firewall-protected hosts may be compromised, good bastion server design\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/02\/Linux_Server_Hardening.jpeg?fit=1170%2C822&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/02\/Linux_Server_Hardening.jpeg?fit=1170%2C822&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/02\/Linux_Server_Hardening.jpeg?fit=1170%2C822&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/02\/Linux_Server_Hardening.jpeg?fit=1170%2C822&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/02\/Linux_Server_Hardening.jpeg?fit=1170%2C822&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":714,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/tips-to-make-your-server-secure\/","url_meta":{"origin":850,"position":5},"title":"Tips To Make your Server Secure","author":"Daniel Draga","date":"October 21, 2016","format":false,"excerpt":"Use secure password \u2022 Insecure passwords are the most common security vulnerability. > Use minimum 8 character passwords with alphanumeric ,grammatical symbols, etc Never use a significant date and dictionary words. \u2022Secure SSH Move SSH access to a different port to deter anyone without specific knowledge of your server from\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/10\/secure-server.jpg?fit=504%2C260&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/850","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/comments?post=850"}],"version-history":[{"count":1,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/850\/revisions"}],"predecessor-version":[{"id":852,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/850\/revisions\/852"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/media\/851"}],"wp:attachment":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/media?parent=850"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/categories?post=850"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/tags?post=850"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}