Mmmh, ok. And what measure have you chosen against a program to just
remove LittleSnitch from the startup list
Not too sure what you mean, what programs are likely to do that?
trojan horses, malware of any kind ...
regards
martin
___
trojan horses, malware of any kind ...
Do they run on their own, do they need to be run and do they need
permission?
Trojans are usually run by the user and do harmful operations in the
background, but a trojan could also install Login Items.
Of course they need permissions - When run by
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 25 Oct 2005, at 12:40, Martin Kissner wrote:
Trojans are usually run by the user
In that case I'm the only user on here. Having used Windows for the
past 100 years or so I'm reasonably well gened up on what to and what
not to run.
For
On Oct 25, 2005, at 1:57 PM, Tony Boom wrote:
Am I right in thinking for LS to be compromised I, as the soul user
of this Mac, have to specifically give permission and run rogue
software?
That's wrong. Malware may innoculate your system using an authorized
application such as your browser
Hi Tony,
Trojans are usually run by the user
I have a hardware firewall in my router and the apple firewall
but neither allow full control over attempted outgoing connections.
Well, actually the apple firewall (and probably also the firewall in
your router) allows you full control over
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 24 Oct 2005, at 20:22, LittleSnitch Support wrote:
* Little Snitch protects itself against forced termination (kill)
now.
Last login: Mon Oct 24 21:41:18 on console
Welcome to Darwin!
tony-booms-imac:~ tony$ top
tony-booms-imac:~ tony$
Dear Tony,
you wrote:
* Little Snitch protects itself against forced termination (kill)
now.
Last login: Mon Oct 24 21:41:18 on console
Welcome to Darwin!
tony-booms-imac:~ tony$ top
tony-booms-imac:~ tony$ kill 236
- -bash: kill: (236) - Operation not permitted