![]() The reason is that while the built-in Mac OS firewall monitors and blocks incoming traffic, it doesn't provide any protection against outbound traffic. If you're using your Mac to access any public network. One of the links on the LuLu download page (6 Questions) says: I buy his stuff (well, it's really donationware) just to support his continued work. The apps are clean, to the point, effective, and easy to manage. LuLu is not only (very) actively developed, the developer is one of the leading Mac security people out there. ![]() On a whim, I swapped out LS for Lulu and so far it seems better problem free. It seems perhaps "less intrusive" than LS? Also, we have one shared family iMac that seemed suffer from network freeze situations a lot, couldn't put a handle on it Seemed like an app, like Firfox, just couldn't load web pages. We have a few Macs in the house and I'm trying lulu on two of them. Since then only LuLu and haven't seen the need for anything else. I had Little Snitch in the past, but had problems and gave up on it.can't even remember what. But I'm guessing you're already familiar with that. ![]() What weaknesses are there to, say, Lulu? Is it actively developed/updated? I generally like the Objective-See stuff as a rule. Radio Silence also seems to be a cheaper alternative to Little Snitch.Ĭurious if anyone has recommendations one way or the other. I'm messing with Lulu on another computer and, while clearly having fewer features, it seems like a functional alternative ( and cheaper). You may also consider an anti-malware product such as Avast, ClamAV, Comodo or Webroot etc though in reality you're extremely, extremely unlikely to have any issues on OS X, especially if you don't have Java enabled in your browser(s).So I've been a Little Snitch user for many years and generally happy with it. Run a limited user account day-to-day (not an Admin account), keep your software and system fully patched (which can be hard as Apple are slow at releasing security updates unfortunately), and run a two way firewall (as you already are). I tend to encrypt my devices with LUKS (built in encryption in Linux).īest advice on your Mac is pretty much the same as any other system. ![]() I do not run truecrypt or bitlocker (a Microsoft Windows technology) as I only run Linux, BSD and OS X at home. You couldn't exploit a patched server with unpatched clients, so basically it was the servers being patched that counted. Home systems weren't particularly troublesome compared to servers which execute the code. They were patched quickly and newer versions were releaed within a day or two which mitigated the vulnerability. Some old versions were still around and weren't recent enough to have the bug, but many if not most systems did. Many Thank'sĪll fairly modern versions of openssl / libopenssl contained the heartbleed bug, whether that was on Linux, BSD, OS X or Windows. If you have any recommendation for me I would love to here them. Lastly if I'm not asking to many question, What the best way to secure my MacBook Pro I'm current using LS and tunnelblick with Airvpn. Was you Linux machine susceptible to the resent ssl vulnerability? Also do you use Truecrypt or Bitlocker? Do you like one over the other?
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |