Skip to main content

Setting Up a Firewall: Mac OS X 10.6.x (Snow Leopard)

Setting Up a Firewall: Mac OS X 10.6.x (Snow Leopard)

Learn how to set up the Mac OS 10.6.x firewall to protect your computer against malicious activity.

Note: This basic firewall closes off unused network service ports, but lets you create exceptions for specific programs running on your computer. To check your version of OS X, open the Apple menu (the blue apple icon in the upper left corner of the screen), and selectAbout This Mac.

Expand all

1. Open System Preferences.

  • Open the Apple menu, and select System Preferences…
  • Click the Security icon in the Personal area of the window, or open the View menu at the top of the screen, and selectSecurity.

2. Activate the firewall.

  • Click the Firewall tab.
    • Note: If the Start button is gray and you can’t click it, click the lock icon at the bottom of the window, and enter your adminstrator password when prompted.
  • Click the Start button.
  • Click the Advanced button.
  • Select the desired firewall configuration.
  • Click OK.
  • Close the Security pane to save your selections.

Task Screenshot

3. Create program exceptions.

  • Click the Firewall tab in the Security pane.
  • Click the Advanced button.
  • Click the + symbol.
  • Find the program that you'd like to add as an exception.
  • Click the Add button.
  • Repeat the above steps for each program you'd like to add to the exceptions list.
  • Set whether to Allow incoming connections or Block incoming connections for the programs in your list by clicking the up or down arrows to the far right of the program name, then selecting the appropriate option.
  • Click OK.
  • Close the Security pane saving your selections.

Note: UCSD does not officially recommend any exceptions; any university programs will not be affected. However, in the example below, George Bluefin has added iTunes as an exception. If he did not have iTunes enabled in his firewall exceptions list (which allows incoming connections), people wouldn't be able to connect or listen to his shared music when his firewall is on.

Task Screenhot

Comments

Popular posts from this blog

NetSurveyor :: 802.11 (WiFi) Network Discovery / Scanner Tool

NetSurveyor :: 802.11 (WiFi) Network Discovery / Scanner Tool http://www.performancewifi.net/performance-wifi/main/NetSurveyor.htm NetSurveyor is an 802.11 (WiFi) network discovery tool and, as such, its goal in life is to gather information about nearby wireless access points in real time and display it in a useful way. Similar in purpose to NetStumbler , it includes many more features. The data is displayed using a variety of different diagnostic views and charts. Data can be recorded for extended periods and played-back at a later date/time. Also, reports can be generated in Adobe PDF format. Applications for NetSurveyor include the following: During the installation of a wireless network, as an aid in verifying the network is properly configured and antennas are positioned at locations to achieve efficient transmission / reception -- that is, for use in verifying WiFi coverage and maximizing beacon signal strength Trouble-shooting an existing network or wireless environm...

Handle Too-Long Command Lines with xargs

Handle Too-Long Command Lines with xargs xargs is one of those UNIX utilities that seems pretty useless when you first hear about it -- but turns into one of the handiest tools you can have. xargs reads a group of arguments from its standard input, then runs a UNIX command with that group of arguments. It keeps reading arguments and running the command until it runs out of arguments. The shell's backquotes do the same kind of thing, but they give all the arguments to the command at once. This can give you a Too many arguments error. Here are a couple of examples: If you want to print most of the files in a large directory, put the output of ls into a file. Edit the file to leave just the filenames you want printed. Give the file to xargs ' standard input: % ls > allfiles.tmp % vi allfiles.tmp % xargs lpr What did that do? With lines like these in allfiles.tmp : % cat allfiles.tmp afile application ... yoyotest zapme xargs ran one or more lpr commands, each wit...

Cisco Command "Auto secure"

Cisco Command "Auto secure" In today's article, I'm going to quickly inform you about the Privileged EXEC command named "auto secure". Network administrators (like you) use the "auto secure" command to secure the management and forwarding planes of a router. Another way of saying it is, CCNAs use this command to secure a router by disabling common IP services which can be exploited by attackers to initiate network attacks. When the command is typed on a router, it takes the user (ccna) through a command line-interface (CLI) semi-interactive session (which is also known as the AutoSecure dialogue). Below is the command's syntax: auto secure [management | forwarding] [no-interact | full] [ntp | login | ssh | firewall | tcp-intercept] As you can see, the command can use several "optional" keywords: management - This (optional) keyword is used to only secure the management plane of a router. forwarding - This (optional) keyword is used to...