definitely use ethernet.  

also definitely, absolutely get a good hardware firewall, read the manual, and change 
the
default password on the thing!( there are now a number of exploits aimed at firewalls
rather than routers, particularly since the majority of them are still setup to use the
factory default password.  not changing that number is like having 1-2-3 be the
combination to your briefcase, easy to remember, but stupid!).  you definitely need a
firewall, despite what some may say, crackers do try to break into individual 
machines, in
fact there are email viruses designed to take over a machine so it can be used for
spamming, denial of service attacks, etc.  some of these things are also done without
viruses.  os x has had a major security hole in the past (all versions of bsd did, and 
it
was big enough to drive a truck through but quickly and easily fixed), translation,
despite what some people seem to think based on religious fervor, os x, like any and 
all
os's, does have significant security holes.  

pc's may be the main target of crackers, but if someone knows of a mac hole, they'll 
use
it, and macs are becoming a more popular target because of their increasing popularity 
and
possibly also because many mac users are somewhat smug about the lack of 
vulnerabilities,
i would suggest that the emperor has no clothes...  

i'd also suggest actually looking at the firewall logs occasionally, sometimes if a
break-in is successful it will be obvious from the log- for instance there's an 
explorer
bug where a fake plugin, disguised as a picture in a popup ad actually sets it up so 
that
all of your keystrokes are sent to a sight in russia where they search the data for
passwords and credit card information.  i've been unable to find any info on whether 
this
affects only pc's or pc and mac, but it could easily be both as most of the code is the
same, they are not 2 separate programs, just the same program compiled for 2 different
machines with a few minor changes necessitated by the os etc. (codewarrior for instance
makes it almost trivial to write one program that works on multiple machine types, and
this is a very common practice for any application that runs on more than one type of
machine, and usually that means any bugs and flaws will be on both versions).  in this
case, if all destination ip's are logged you'd see data frequently going to this 
russian
site, though more than likely you wouldn't, however a good firewall should stop this 
data
and log the destination, making you aware that your' machine has been compromised.  
this
is particularly important for laptop users who may log on from somewhere else some of 
the
time and may not always be behind a firewall.

if nothing else, a spare iic can be made into a fine firewall with several versions of
*nix for free, and so can an old pc box, and even a very slow box works just fine for 
this application.

-- 
<http://www.informationclearinghouse.info/article3267.htm>  proof that
the U.S. media is now state controlled!  Ask your' local tv station why
the hell they aren't airing the news any more!  Our system of government
requires an informed public, with their eyes open.

-- 
G-List is sponsored by <http://lowendmac.com/> and...

 Small Dog Electronics    http://www.smalldog.com | Refurbished Drives |
 -- We have Apple Refurbished Monitors in stock!  |  & CDRWs on Sale!  |

      Support Low End Mac <http://lowendmac.com/lists/support.html>

G-List list info:       <http://lowendmac.com/lists/g-list.shtml>
  --> AOL users, remove "mailto:";
Send list messages to:  <mailto:[EMAIL PROTECTED]>
To unsubscribe, email:  <mailto:[EMAIL PROTECTED]>
For digest mode, email: <mailto:[EMAIL PROTECTED]>
Subscription questions: <mailto:[EMAIL PROTECTED]>
Archive: <http://www.mail-archive.com/g-list%40mail.maclaunch.com/>

Using a Mac? Free email & more at Applelinks! http://www.applelinks.com

Reply via email to