Lynn,

Why go through all that inaccessible trouble when you could just use a hardware firewall. Beside, in many ways, they can be more secure than a software firewall.

OK, before you say not necessarily Chris, they're not always more secure. Read what I just said again, please! I, said...

they... can!... be! more secure. I didn't say... they... are!... more secure.

It's all about how well the user knows how to configure the firewall/router. If you know what you're doing, which it sounds like you and gordon must... then you can deploy quite a nice firewall with something as simple as a Linksys router.

For example, I'm not gonna go into too much of the specifics for obvious security reasons, but our network is running a Linksys router with the firewall enabled, and I literally have it so secured, 1, it doesn't broadcast our wifi SSID, we manually have to enter it, we don't have a wifi incription key. We have it set where we have to use a push button, and that button it set in such a way that you have to connect the device within 30 seconds of pushing it. We also are set where from certain hours of the day which I won't disclose for security reasons, our internet connection is completely down and not connected. I also have it set where when someone connects to our network, such as a guest etc. they have to agree to the terms I've written up before they can get online. I have it set where any activity such as packet snipping, constant pinging/ping flooding, etc. will be rejected with 100% packet loss. I am mac cloning another IP address which then is routed through a proxy server so that the outside world never sees my real IP. I have things set not through port forwarding for my servers I locally run, but instead through port triggerring, so that the only time they're opened is when they're needed, plus I've done some things which I won't go into the specifics with regarding my dhcp zone mapping. I also have it set to alert me with a screen popup on all my computers, both Mac and Windows of any suspicious connection activity, then I can blacklist the connection if I want, and can not only from that screen send the connection report to a txt file log, but also can immediately send it out to my printer, or can e-mail it to my I S P's abuse team. (Not that they normally do crap about things like this... Trust me, I have very good ways to know this.)

So, yeah, as you can see, even without a software based firewall, my point is, why use one? There are just so! many things you can do, if you know what you're doing, and are willing to sit down and take the time to configure the things correctly.

Chris.

----- Original Message ----- From: "Mrs. Lynnette Annabel Smith" <[email protected]>
To: "Mac OSX & iOS Accessibility" <[email protected]>
Sent: Sunday, March 02, 2014 6:39 AM
Subject: Little Snitch for Mac


Hello everybody

I haven’t been around for a while as I’ve been incredibly busy. But I wanted to alert you all to an application which you may be tempted to buy.

Although this is a totally genuine application, it works very well as long as you’re not a VoiceOver user. The configuration utility is totally inaccessible, even the menu bar items do not show up. There is actually no way, as far as I have found, to even know that this application is running, let alone configure it. Little Snitch is very comprehensive as far as firewalls go. And it’s such a shame that it isn’t accessible. But all that said, possibly you can do similar things with the internal OS X firewall and, of course, that won’t cost you a bean! Little Snitch sells for $34.95 USD regular price, but occasionally comes up on Mac Update as a promo.

If anybody knows of a way to configure this with VoiceOver, please share the info. I’d love to be wrong on this occasion. But our testing has shown no accessibility whatsoever with the exception of the installer and uninstaller utilities.

Warm regards

Lynne

<--- Mac Access At Mac Access Dot Net --->

To reply to this post, please address your message to [email protected]

You can find an archive of all messages posted to the Mac-Access forum at either the list's own dedicated web archive:
<http://mail.tft-bbs.co.uk/pipermail/mac-access/index.html>
or at the public Mail Archive:
<http://www.mail-archive.com/[email protected]/>.
Subscribe to the list's RSS feed from:
<http://www.mail-archive.com/[email protected]/maillist.xml>

As the Mac Access Dot Net administrators, we do our very best to ensure that the Mac-Access E-Mal list remains malware, spyware, Trojan, virus and worm-free. However, this should in no way replace your own security strategy. We assume neither liability nor responsibility should something unpredictable happen.

Please remember to update your membership preferences periodically by visiting the list website at:
<http://mail.tft-bbs.co.uk/mailman/listinfo/mac-access/options/>

<--- Mac Access At Mac Access Dot Net --->

To reply to this post, please address your message to [email protected]

You can find an archive of all messages posted    to the Mac-Access forum at 
either the list's own dedicated web archive:
<http://mail.tft-bbs.co.uk/pipermail/mac-access/index.html>
or at the public Mail Archive:
<http://www.mail-archive.com/[email protected]/>.
Subscribe to the list's RSS feed from:
<http://www.mail-archive.com/[email protected]/maillist.xml>

As the Mac Access Dot Net administrators, we do our very best to ensure that 
the Mac-Access E-Mal list remains malware, spyware, Trojan, virus and 
worm-free.  However, this should in no way replace your own security strategy.  
We assume neither liability nor responsibility should something unpredictable 
happen.

Please remember to update your membership preferences periodically by visiting 
the list website at:
<http://mail.tft-bbs.co.uk/mailman/listinfo/mac-access/options/>

Reply via email to