Article Keyword Videos to Watch
Click on the image to start the video.
Images - Links - Articles
Keep Secure Your Apple Computer
Researchers and engineers who are working in the security field must have strong constitutions—especially when it comes to weathering negative backlash and tired conspiracy theories whenever apple security and Mac OS X are mentioned in the same breath.
The term “virus” is used so often as a generic reference to any malicious code that here at Symantec we tend to use more appropriate blanket terms like "security threat" and “malicious code.” Just how bad is the misuse of the term virus?
Apple security exploits cropped up and have received a lot of attention.
The first vulnerability involved the Leap. Like so many other worms, Leap.A relied on tricking users into downloading and opening a suspicious file. If you ignore file attachments that you don't expect or that look suspicious, you'll protect yourself from the vast majority of Internet crud, especially the kind that arrives via e-mail.
Like so many other worms, Leap.A relied on tricking users into downloading and opening a suspicious file. If you ignore file attachments that you don't expect or that look suspicious, you'll protect yourself from the vast majority of Internet crud, especially the kind that arrives via e-mail. The worm, known as Inqtana.A, exploited a hole in the Bluetooth software in OS X 10.4 that had been patched last year. Inqtana. Keep your operating system up-to-date and don't accept unknown files, whether they come to you in e-mail, iChat, or beamed from someone's Bluetooth phone.
The next one is a vulnerability in Apple's browser Safari, had the most potential for damage. By default, Safari is set to automatically open "safe" file types, such as movies and music, after they've been downloaded. Before Apple closed this hole, malicious scripts could be disguised as an innocuous file type and set to automatically run upon download. Unchecking the "Open 'safe' files after downloading" box in Safari's General Preferences pane also closes the security hole. Browsers other than Safari were not affected.
Hackers who want your passwords and credit-card numbers don't care whether you're using a Mac or a PC. Either way, if you use a Wi-Fi network, you're making their task easier. You should definitely enable whatever encryption your home network supports, be it WEP or WPA. This prevents unauthorized users from hopping onto your network and possibly snooping on your communications and getting into your hard drive.
Sharing Option: Use your firewall to close off access to all the ports that you don't need open, including file sharing. You might also consider password-protecting or encrypting all or some of your hard drive.
Confidental Documents: If you don't want someone grabbing your financial data out of the air, save your Internet shopping and banking for your secured home network.
Shoulder-Surfing. Snooping doesn't always require high-tech gear. As I just mentioned, it's unwise to work on super-secret company plans in public--but if you must, be aware of what's going on around you.
Wi-Fi Technology: Whenever you don't need it, turn off your Wi-Fi card. You'll block access to your laptop and conserve battery life.
Security Updates are also available for software released independently from Mac OS X. For example, Security Update 2005-002 is only available for systems containing the vulnerable version of Java 1.4.2. Software Updates are packaged in a manner to keep systems secure. Security Updates are only offered to systems that need the update, and not to later versions that have incorporated the Security Update.
Welcome to our Apple Computer & Parts Section.
Here you’ll find all the various used Apple computer models that are currently available, as well as our inventory on Apple computer parts. Here you find how your apple computer safe from virsus and spam.They have offered to systems that need the update, and give the latest versions that have incorporated the Security Update.
The internet is the best place to buy cheap computer parts and take it secure. Due to increase in demand for many parts in many suppliers find it profitable to sell their products online. The online dealers have their websites, which offer information on the various types of Mac parts available for purchase. Go to http://www.Applepart.com, a leading online resource for buying Apple Parts. Applepart.com is the online catalog for Apple Parts ..
About the Author: Author: Nivea David
For Listing visit http://www.applepart.com (A leading online resource for buying Apple Parts ) . You can also vist our other site http://www.idigitals.com which is a Custom Built Pro Workstations offering the latest in Computer Technology