Lynn,
Why go through all that inaccessible trouble when you could just use a
hardware firewall. Beside, in many ways, they can be more secure than a
software firewall.
OK, before you say not necessarily Chris, they're not always more secure.
Read what I just said again, please! I, said...
they... can!... be! more secure. I didn't say... they... are!... more
secure.
It's all about how well the user knows how to configure the firewall/router.
If you know what you're doing, which it sounds like you and gordon must...
then you can deploy quite a nice firewall with something as simple as a
Linksys router.
For example, I'm not gonna go into too much of the specifics for obvious
security reasons, but our network is running a Linksys router with the
firewall enabled, and I literally have it so secured, 1, it doesn't
broadcast our wifi SSID, we manually have to enter it, we don't have a wifi
incription key. We have it set where we have to use a push button, and that
button it set in such a way that you have to connect the device within 30
seconds of pushing it. We also are set where from certain hours of the day
which I won't disclose for security reasons, our internet connection is
completely down and not connected. I also have it set where when someone
connects to our network, such as a guest etc. they have to agree to the
terms I've written up before they can get online. I have it set where any
activity such as packet snipping, constant pinging/ping flooding, etc. will
be rejected with 100% packet loss. I am mac cloning another IP address
which then is routed through a proxy server so that the outside world never
sees my real IP. I have things set not through port forwarding for my
servers I locally run, but instead through port triggerring, so that the
only time they're opened is when they're needed, plus I've done some things
which I won't go into the specifics with regarding my dhcp zone mapping. I
also have it set to alert me with a screen popup on all my computers, both
Mac and Windows of any suspicious connection activity, then I can blacklist
the connection if I want, and can not only from that screen send the
connection report to a txt file log, but also can immediately send it out to
my printer, or can e-mail it to my I S P's abuse team. (Not that they
normally do crap about things like this... Trust me, I have very good ways
to know this.)
So, yeah, as you can see, even without a software based firewall, my point
is, why use one? There are just so! many things you can do, if you know
what you're doing, and are willing to sit down and take the time to
configure the things correctly.
Chris.
----- Original Message -----
From: "Mrs. Lynnette Annabel Smith" <[email protected]>
To: "Mac OSX & iOS Accessibility" <[email protected]>
Sent: Sunday, March 02, 2014 6:39 AM
Subject: Little Snitch for Mac
Hello everybody
I haven’t been around for a while as I’ve been incredibly busy. But I wanted
to alert you all to an application which you may be tempted to buy.
Although this is a totally genuine application, it works very well as long
as you’re not a VoiceOver user. The configuration utility is totally
inaccessible, even the menu bar items do not show up. There is actually no
way, as far as I have found, to even know that this application is running,
let alone configure it. Little Snitch is very comprehensive as far as
firewalls go. And it’s such a shame that it isn’t accessible. But all that
said, possibly you can do similar things with the internal OS X firewall
and, of course, that won’t cost you a bean! Little Snitch sells for $34.95
USD regular price, but occasionally comes up on Mac Update as a promo.
If anybody knows of a way to configure this with VoiceOver, please share the
info. I’d love to be wrong on this occasion. But our testing has shown no
accessibility whatsoever with the exception of the installer and uninstaller
utilities.
Warm regards
Lynne
<--- Mac Access At Mac Access Dot Net --->
To reply to this post, please address your message to
[email protected]
You can find an archive of all messages posted to the Mac-Access forum at
either the list's own dedicated web archive:
<http://mail.tft-bbs.co.uk/pipermail/mac-access/index.html>
or at the public Mail Archive:
<http://www.mail-archive.com/[email protected]/>.
Subscribe to the list's RSS feed from:
<http://www.mail-archive.com/[email protected]/maillist.xml>
As the Mac Access Dot Net administrators, we do our very best to ensure that
the Mac-Access E-Mal list remains malware, spyware, Trojan, virus and
worm-free. However, this should in no way replace your own security
strategy. We assume neither liability nor responsibility should something
unpredictable happen.
Please remember to update your membership preferences periodically by
visiting the list website at:
<http://mail.tft-bbs.co.uk/mailman/listinfo/mac-access/options/>
<--- Mac Access At Mac Access Dot Net --->
To reply to this post, please address your message to [email protected]
You can find an archive of all messages posted to the Mac-Access forum at
either the list's own dedicated web archive:
<http://mail.tft-bbs.co.uk/pipermail/mac-access/index.html>
or at the public Mail Archive:
<http://www.mail-archive.com/[email protected]/>.
Subscribe to the list's RSS feed from:
<http://www.mail-archive.com/[email protected]/maillist.xml>
As the Mac Access Dot Net administrators, we do our very best to ensure that
the Mac-Access E-Mal list remains malware, spyware, Trojan, virus and
worm-free. However, this should in no way replace your own security strategy.
We assume neither liability nor responsibility should something unpredictable
happen.
Please remember to update your membership preferences periodically by visiting
the list website at:
<http://mail.tft-bbs.co.uk/mailman/listinfo/mac-access/options/>