

{"id":703,"date":"2011-12-29T16:18:52","date_gmt":"2011-12-29T21:18:52","guid":{"rendered":"https:\/\/rud.is\/b\/?p=703"},"modified":"2018-03-24T09:10:05","modified_gmt":"2018-03-24T14:10:05","slug":"three-resolutions-for-mac-os-x-users","status":"publish","type":"post","link":"https:\/\/rud.is\/b\/2011\/12\/29\/three-resolutions-for-mac-os-x-users\/","title":{"rendered":"Three Resolutions For Mac OS X Users"},"content":{"rendered":"<p>In 2011, we saw a large increase in web site exploits that exposed private user data as well as a breakdown in the trust of SSL (for various reasons) and the introduction of real malware on to the OS X scene. If there were just three things I could ask Mac users to do in 2012 to help protect themselves (&#8216;cuz if your a Windows user it&#8217;s been game-over for years for you already) these are what they would be.<\/p>\n<p><strong>Secure &amp; Diversify Your Web Credentials<\/strong><\/p>\n<p>Just like companies have lost paper files\u2014and then laptops\u2014containing private data, web sites have and will continue to leak your information like a sieve. While you should choose carefully which ones you let have very sensitive data (like credit card numbers, government id numbers and health information), you really do need to ensure that you at least use different and &#8220;<a href=\"https:\/\/xkcd.com\/936\/\">strong<\/a>&#8221; passwords at each site you have an account at to avoid having hackers <span class=\"removed_link\" title=\"http:\/\/www.howtohackwebsite.com\/2011\/10\/facebook-says-600000-account-logins.html\">replay your credentials<\/span> at other sites.<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"706\" data-permalink=\"https:\/\/rud.is\/b\/2011\/12\/29\/three-resolutions-for-mac-os-x-users\/imgres\/\" data-orig-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2011\/12\/imgres.jpeg?fit=204%2C204&amp;ssl=1\" data-orig-size=\"204,204\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"imgres\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2011\/12\/imgres.jpeg?fit=204%2C204&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2011\/12\/imgres-150x150.jpg?resize=150%2C150&#038;ssl=1\" alt=\"\" title=\"imgres\" width=\"150\" height=\"150\" class=\"alignleft size-thumbnail wp-image-706\" srcset=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2011\/12\/imgres.jpeg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2011\/12\/imgres.jpeg?w=204&amp;ssl=1 204w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/>The easiest way to do this is to use a utility like <a href=\"https:\/\/1password.com\/\">1Password<\/a> (@1Password &amp; usually $50 but is on sale for $30 for a short time) by AgileBits which works with practically every browser and will let you create and use diverse passwords at the click of a button. It even works on your mobile device, so you don&#8217;t have to worry about remembering the (necessarily) ugly passwords they end up creating. You can even use 1Password to store secure notes to yourself (say, in the event you need to use complex credentials on systems you cannot install 1Password).<\/p>\n<p>By using 1Password, you will avoid being the in the 60-70% of users who have their credentials stolen and  have to worry or scramble because they used the same ones on an array of popular web sites. Windows users can also take advantage of this tool (and there&#8217;s a bundle price if you need it for both platforms).<\/p>\n<p>You <i>can<\/i> do this without 1Password (e.g. keep a text file or spreadsheet in a secure disk image), but the ease of use is worth the price of 1Password. If you do decide to use a more manual approach, generating secure passwords with tools like <a href=\"https:\/\/thebestvpn.com\/password-generator\/\">this one<\/a> will also help you be a bit more secure than your brain&#8217;s &#8220;random&#8221; sequence generator.<\/p>\n<p><strong>Know What&#8217;s Going On With Your System<\/strong><\/p>\n<p>While the Mac App Store can help ensure you aren&#8217;t loading &#8220;bad apps&#8221; onto your system, the advent of web-born malware for the Mac was seen for real this year and 2012 may prove to be the year we see the Mac becoming more of a target. There&#8217;s no guarantee that Mac App Store apps are non-malicious and you really have no idea what the ones you download from third-party sites contain, even if they do the task you want them to. Some apps that you &#8220;know&#8221; you trust may be sending out &#8220;phone home&#8221; signals or other non-user-initiated or informed-of Internet communications with unknown payloads.<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"705\" data-permalink=\"https:\/\/rud.is\/b\/2011\/12\/29\/three-resolutions-for-mac-os-x-users\/imgres-1\/\" data-orig-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2011\/12\/imgres-1.jpeg?fit=225%2C225&amp;ssl=1\" data-orig-size=\"225,225\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"imgres-1\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2011\/12\/imgres-1.jpeg?fit=225%2C225&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2011\/12\/imgres-1-150x150.jpg?resize=150%2C150&#038;ssl=1\" alt=\"\" title=\"imgres-1\" width=\"150\" height=\"150\" class=\"alignright size-thumbnail wp-image-705\" srcset=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2011\/12\/imgres-1.jpeg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2011\/12\/imgres-1.jpeg?w=225&amp;ssl=1 225w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/>This is where a cool little utility called <a href=\"https:\/\/www.obdev.at\/products\/littlesnitch\/index.html\">Little Snitch <\/a> (@littlesnitch and $30) by Objective Development can really help open your eyes as to what applications and processes (programs you may not be able to &#8220;see&#8221; easily without tools like the Mac Activity Monitor app) are trying to do on your network. Their own information page says it better then I could paraphrase:<\/p>\n<blockquote><p>Little Snitch informs you whenever a program attempts to establish an outgoing Internet connection. You can then choose to allow or deny this connection, or define a rule how to handle similar, future connection attempts. This reliably prevents private data from being sent out without your knowledge. Little Snitch runs inconspicuously in the background and it can also detect network related activity of viruses, trojans and other malware.<\/p><\/blockquote>\n<p>Again, you could monitor your Mac firewall logs by hand with the OS X Console application and tweak your own firewall rules, but Little Snitch won&#8217;t forget to watch out for you.<\/p>\n<p><strong>Secure Your Public &amp; Untrusted WiFi Connections<\/strong><\/p>\n<p>While Facebook, Twitter, Gmail and other sites have SSL (https) options (some using it by default), you really need to take control of your own transmission security when not on networks you trust. Why? Well one example is that you may be at a restaurant (as I was with my kids in November) where they terminate all SSL sessions at their border gateway (meaning they could read all the data that should have been encrypted). You also cannot be sure when Facebook is going to mindlessly toggle their SSL settings or when a Facebook application causes the SSL settings to be disabled. Even though SSL is relied upon by pretty much everyone to &#8220;just work&#8221;, it&#8217;s not a given or a panacea.<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"704\" data-permalink=\"https:\/\/rud.is\/b\/2011\/12\/29\/three-resolutions-for-mac-os-x-users\/512x512\/\" data-orig-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2011\/12\/512x512.png?fit=500%2C500&amp;ssl=1\" data-orig-size=\"500,500\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}\" data-image-title=\"512&amp;#215;512\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2011\/12\/512x512.png?fit=500%2C500&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2011\/12\/512x512.png?resize=150%2C150&#038;ssl=1\" alt=\"\" title=\"512x512\" width=\"150\" height=\"150\" class=\"alignleft size-thumbnail wp-image-704\" srcset=\"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2011\/12\/512x512.png?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2011\/12\/512x512.png?resize=300%2C300&amp;ssl=1 300w, https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2011\/12\/512x512.png?w=500&amp;ssl=1 500w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/>When on unfamiliar, public or other untrusted networks, it&#8217;s truly necessary to take control of the encryption as best as you can and use some type of Virtual Private Network : <a href=\"https:\/\/www.cisco.com\/c\/en\/us\/about\/press\/internet-protocol-journal\/back-issues\/table-contents-18\/what-is-a-vpn.html\">VPN<\/a> : setup. While running your own is the only real way to know what&#8217;s happening at the VPN termination point, there are reputable services out there who can provide security and that you should be able to trust (at least better than SSL in a Starbucks). One of them\u2014and I believe the most user-friendly one\u2014is <span class=\"removed_link\" title=\"https:\/\/www.getcloak.com\/accounts\/sign-up\/\">Cloak<\/span> (@getcloak and FREE to $8-$15\/month) by Bourgeois Bits.<\/p>\n<p>Once installed, Cloak will detect when you&#8217;re on a public WiFi connection and automatically kick in a VPN session. You can start up a VPN session at any time with a single click in the OS X menu bar and also define more granular rules (if you want to). With Cloak, you have no excuse to not take an added measure of security when you&#8217;re out and about with your Mac.<\/p>\n<p>You could do this for free (provided you trust your home Internet provider) with many modern routers or even a simple Linux\/BSD or OS X box providing VPN services, but it would still not be as simple as using Cloak.<\/p>\n<p>With these three simple steps\/apps (less than $100), you will be far less at risk than you (probably) currently are as you run naked &amp; blind across the internet with your password stapled to your forehead.<\/p>\n<p>If you have any suggestions for similar\/competing tools or have additional resolutions you think would be helpful to Mac users (or any computer user), drop a note in the comments.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In 2011, we saw a large increase in web site exploits that exposed private user data as well as a breakdown in the trust of SSL (for various reasons) and the introduction of real malware on to the OS X scene. If there were just three things I could ask Mac users to do in [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":true,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":3,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"","footnotes":""},"categories":[81,12,80],"tags":[562,100,256,391,265,393,553,454,554,559,566,736,552,125,745,111,563,106,557,458,556,741,565,564,551,288,121,558,266,289,747,555,560,561],"class_list":["post-703","post","type-post","status-publish","format-standard","hentry","category-firewall","category-os-x","category-vpn","tag-bsd","tag-computer-network-security","tag-cryptographic-protocols","tag-encryption-2","tag-facebook","tag-firewall-2","tag-home-internet","tag-http-secure","tag-informed-of-internet-communications","tag-internet-connection","tag-internet-privacy","tag-linux","tag-mac-app-store","tag-mac-os-x","tag-malware","tag-microsoft-windows","tag-mobile-device","tag-password","tag-reputable-services","tag-secure-communication","tag-similarcompeting-tools","tag-ssl","tag-ssl-vpn","tag-ssl-explorer-community-edition","tag-starbucks","tag-tunneling-protocols","tag-twitter","tag-untrusted-networks","tag-usd","tag-virtual-private-network","tag-vpn","tag-web-credentials","tag-web-site-exploits","tag-web-born-malware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Three Resolutions For Mac OS X Users - rud.is<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/rud.is\/b\/2011\/12\/29\/three-resolutions-for-mac-os-x-users\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Three Resolutions For Mac OS X Users - rud.is\" \/>\n<meta property=\"og:description\" content=\"In 2011, we saw a large increase in web site exploits that exposed private user data as well as a breakdown in the trust of SSL (for various reasons) and the introduction of real malware on to the OS X scene. If there were just three things I could ask Mac users to do in [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/rud.is\/b\/2011\/12\/29\/three-resolutions-for-mac-os-x-users\/\" \/>\n<meta property=\"og:site_name\" content=\"rud.is\" \/>\n<meta property=\"article:published_time\" content=\"2011-12-29T21:18:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-03-24T14:10:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/rud.is\/b\/wp-content\/uploads\/2011\/12\/imgres-150x150.jpg\" \/>\n<meta name=\"author\" content=\"hrbrmstr\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"hrbrmstr\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/12\\\/29\\\/three-resolutions-for-mac-os-x-users\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/12\\\/29\\\/three-resolutions-for-mac-os-x-users\\\/\"},\"author\":{\"name\":\"hrbrmstr\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"headline\":\"Three Resolutions For Mac OS X Users\",\"datePublished\":\"2011-12-29T21:18:52+00:00\",\"dateModified\":\"2018-03-24T14:10:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/12\\\/29\\\/three-resolutions-for-mac-os-x-users\\\/\"},\"wordCount\":1084,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"image\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/12\\\/29\\\/three-resolutions-for-mac-os-x-users\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2011\\\/12\\\/imgres-150x150.jpg\",\"keywords\":[\"BSD\",\"Computer network security\",\"Cryptographic protocols\",\"encryption\",\"Facebook\",\"firewall\",\"home Internet\",\"HTTP Secure\",\"informed-of Internet communications\",\"Internet connection\",\"Internet privacy\",\"Linux\",\"Mac App Store\",\"Mac OS X\",\"Malware\",\"Microsoft Windows\",\"mobile device\",\"Password\",\"reputable services\",\"Secure communication\",\"similar\\\/competing tools\",\"SSL\",\"SSL VPN\",\"SSL-Explorer: Community Edition\",\"Starbucks\",\"Tunneling protocols\",\"Twitter\",\"untrusted networks\",\"USD\",\"Virtual private network\",\"VPN\",\"Web Credentials\",\"web site exploits\",\"web-born malware\"],\"articleSection\":[\"Firewall\",\"OS X\",\"VPN\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/12\\\/29\\\/three-resolutions-for-mac-os-x-users\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/12\\\/29\\\/three-resolutions-for-mac-os-x-users\\\/\",\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/12\\\/29\\\/three-resolutions-for-mac-os-x-users\\\/\",\"name\":\"Three Resolutions For Mac OS X Users - rud.is\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/12\\\/29\\\/three-resolutions-for-mac-os-x-users\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/12\\\/29\\\/three-resolutions-for-mac-os-x-users\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2011\\\/12\\\/imgres-150x150.jpg\",\"datePublished\":\"2011-12-29T21:18:52+00:00\",\"dateModified\":\"2018-03-24T14:10:05+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/12\\\/29\\\/three-resolutions-for-mac-os-x-users\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/12\\\/29\\\/three-resolutions-for-mac-os-x-users\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/12\\\/29\\\/three-resolutions-for-mac-os-x-users\\\/#primaryimage\",\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2011\\\/12\\\/imgres-150x150.jpg\",\"contentUrl\":\"https:\\\/\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2011\\\/12\\\/imgres-150x150.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/12\\\/29\\\/three-resolutions-for-mac-os-x-users\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/rud.is\\\/b\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Three Resolutions For Mac OS X Users\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#website\",\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/\",\"name\":\"rud.is\",\"description\":\"&quot;In God we trust. All others must bring data&quot;\",\"publisher\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/rud.is\\\/b\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\",\"name\":\"hrbrmstr\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"width\":460,\"height\":460,\"caption\":\"hrbrmstr\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\"},\"description\":\"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7\",\"sameAs\":[\"http:\\\/\\\/rud.is\"],\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/author\\\/hrbrmstr\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Three Resolutions For Mac OS X Users - rud.is","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/rud.is\/b\/2011\/12\/29\/three-resolutions-for-mac-os-x-users\/","og_locale":"en_US","og_type":"article","og_title":"Three Resolutions For Mac OS X Users - rud.is","og_description":"In 2011, we saw a large increase in web site exploits that exposed private user data as well as a breakdown in the trust of SSL (for various reasons) and the introduction of real malware on to the OS X scene. If there were just three things I could ask Mac users to do in [&hellip;]","og_url":"https:\/\/rud.is\/b\/2011\/12\/29\/three-resolutions-for-mac-os-x-users\/","og_site_name":"rud.is","article_published_time":"2011-12-29T21:18:52+00:00","article_modified_time":"2018-03-24T14:10:05+00:00","og_image":[{"url":"https:\/\/rud.is\/b\/wp-content\/uploads\/2011\/12\/imgres-150x150.jpg","type":"","width":"","height":""}],"author":"hrbrmstr","twitter_card":"summary_large_image","twitter_misc":{"Written by":"hrbrmstr","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/rud.is\/b\/2011\/12\/29\/three-resolutions-for-mac-os-x-users\/#article","isPartOf":{"@id":"https:\/\/rud.is\/b\/2011\/12\/29\/three-resolutions-for-mac-os-x-users\/"},"author":{"name":"hrbrmstr","@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"headline":"Three Resolutions For Mac OS X Users","datePublished":"2011-12-29T21:18:52+00:00","dateModified":"2018-03-24T14:10:05+00:00","mainEntityOfPage":{"@id":"https:\/\/rud.is\/b\/2011\/12\/29\/three-resolutions-for-mac-os-x-users\/"},"wordCount":1084,"commentCount":2,"publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"image":{"@id":"https:\/\/rud.is\/b\/2011\/12\/29\/three-resolutions-for-mac-os-x-users\/#primaryimage"},"thumbnailUrl":"https:\/\/rud.is\/b\/wp-content\/uploads\/2011\/12\/imgres-150x150.jpg","keywords":["BSD","Computer network security","Cryptographic protocols","encryption","Facebook","firewall","home Internet","HTTP Secure","informed-of Internet communications","Internet connection","Internet privacy","Linux","Mac App Store","Mac OS X","Malware","Microsoft Windows","mobile device","Password","reputable services","Secure communication","similar\/competing tools","SSL","SSL VPN","SSL-Explorer: Community Edition","Starbucks","Tunneling protocols","Twitter","untrusted networks","USD","Virtual private network","VPN","Web Credentials","web site exploits","web-born malware"],"articleSection":["Firewall","OS X","VPN"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/rud.is\/b\/2011\/12\/29\/three-resolutions-for-mac-os-x-users\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/rud.is\/b\/2011\/12\/29\/three-resolutions-for-mac-os-x-users\/","url":"https:\/\/rud.is\/b\/2011\/12\/29\/three-resolutions-for-mac-os-x-users\/","name":"Three Resolutions For Mac OS X Users - rud.is","isPartOf":{"@id":"https:\/\/rud.is\/b\/#website"},"primaryImageOfPage":{"@id":"https:\/\/rud.is\/b\/2011\/12\/29\/three-resolutions-for-mac-os-x-users\/#primaryimage"},"image":{"@id":"https:\/\/rud.is\/b\/2011\/12\/29\/three-resolutions-for-mac-os-x-users\/#primaryimage"},"thumbnailUrl":"https:\/\/rud.is\/b\/wp-content\/uploads\/2011\/12\/imgres-150x150.jpg","datePublished":"2011-12-29T21:18:52+00:00","dateModified":"2018-03-24T14:10:05+00:00","breadcrumb":{"@id":"https:\/\/rud.is\/b\/2011\/12\/29\/three-resolutions-for-mac-os-x-users\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/rud.is\/b\/2011\/12\/29\/three-resolutions-for-mac-os-x-users\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/rud.is\/b\/2011\/12\/29\/three-resolutions-for-mac-os-x-users\/#primaryimage","url":"https:\/\/rud.is\/b\/wp-content\/uploads\/2011\/12\/imgres-150x150.jpg","contentUrl":"https:\/\/rud.is\/b\/wp-content\/uploads\/2011\/12\/imgres-150x150.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/rud.is\/b\/2011\/12\/29\/three-resolutions-for-mac-os-x-users\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/rud.is\/b\/"},{"@type":"ListItem","position":2,"name":"Three Resolutions For Mac OS X Users"}]},{"@type":"WebSite","@id":"https:\/\/rud.is\/b\/#website","url":"https:\/\/rud.is\/b\/","name":"rud.is","description":"&quot;In God we trust. All others must bring data&quot;","publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/rud.is\/b\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886","name":"hrbrmstr","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","url":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","contentUrl":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","width":460,"height":460,"caption":"hrbrmstr"},"logo":{"@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1"},"description":"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7","sameAs":["http:\/\/rud.is"],"url":"https:\/\/rud.is\/b\/author\/hrbrmstr\/"}]}},"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p23idr-bl","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":187,"url":"https:\/\/rud.is\/b\/2011\/02\/23\/herding-firesheep\/","url_meta":{"origin":703,"position":0},"title":"Herding [Fire]sheep","author":"hrbrmstr","date":"2011-02-23","format":false,"excerpt":"By now, many non-IT and non-Security folk have heard of Firesheep, a tool written by @codebutler which allows anyone using Firefox on unprotected networks to capture and hjijack active sessions to popular social media sites (and other web sites). The sidebar\/extension puts an attactive and easy-to-understand GUI over a process\u2026","rel":"","context":"In &quot;Information Security&quot;","block_context":{"text":"Information Security","link":"https:\/\/rud.is\/b\/category\/information-security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":690,"url":"https:\/\/rud.is\/b\/2011\/12\/18\/an-open-letter-to-it-vendors-for-2012\/","url_meta":{"origin":703,"position":1},"title":"An Open Letter to IT Vendors For 2012","author":"hrbrmstr","date":"2011-12-18","format":false,"excerpt":"Dear $VENDOR, 2012 is nigh upon us and with the new year, I am throwing down a challenge to each and every IT vendor out there. 2011 was a brutal year of incidents, breaches, outages and FUD and the last thing anyone needs is a repeat performance. Instead, please take\u2026","rel":"","context":"In &quot;Information Security&quot;","block_context":{"text":"Information Security","link":"https:\/\/rud.is\/b\/category\/information-security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":11659,"url":"https:\/\/rud.is\/b\/2018\/11\/17\/tis-the-season-to-check-your-ssl-tls-cipher-list-thrice-rcurl-curl-openssl\/","url_meta":{"origin":703,"position":2},"title":"Tis the Season to Check your SSL\/TLS Cipher List Thrice (RCurl\/curl\/openssl)","author":"hrbrmstr","date":"2018-11-17","format":false,"excerpt":"The libcurl library (the foundational library behind the RCurl and curl packages) has switched to using OpenSSL's default ciphers since version 7.56.0 (October 4 2017). If you're a regular updater of curl\/httr you should be fairly current with these cipher suites, but if you're not a keen updater or use\u2026","rel":"","context":"In &quot;R&quot;","block_context":{"text":"R","link":"https:\/\/rud.is\/b\/category\/r\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":136,"url":"https:\/\/rud.is\/b\/2011\/02\/14\/metricon-verification-versus-validation\/","url_meta":{"origin":703,"position":3},"title":"Metricon: Verification versus Validation","author":"hrbrmstr","date":"2011-02-14","format":false,"excerpt":"Speaker:\u00a0Jennifer Bayuk \u00a0 Based on work for Stevens Institute of Technology. How do professional systems engineers work? History: Mainframe physical security (punch cards) cables to terminals network to workstations (some data moves there & on floppies) *spike in misuse & abuse modems and dedicated links to external providers\/partners added midrange\u2026","rel":"","context":"In &quot;Information Security&quot;","block_context":{"text":"Information Security","link":"https:\/\/rud.is\/b\/category\/information-security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":12790,"url":"https:\/\/rud.is\/b\/2020\/07\/10\/a-look-at-pan-os-versions-with-a-bit-of-r\/","url_meta":{"origin":703,"position":4},"title":"A Look at PAN-OS Versions with a Bit of R","author":"hrbrmstr","date":"2020-07-10","format":false,"excerpt":"The incredibly talented folks over at Bishop Fox were quite generous this week, providing a scanner for figuring out PAN-OS GlobalProtect versions. I've been using their decoding technique and date-based fingerprint table to keep an eye on patch status (over at $DAYJOB we help customers, organizations, and national cybersecurity centers\u2026","rel":"","context":"In &quot;Cybersecurity&quot;","block_context":{"text":"Cybersecurity","link":"https:\/\/rud.is\/b\/category\/cybersecurity\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":588,"url":"https:\/\/rud.is\/b\/2011\/06\/14\/weis-2011-session-2-identity-the-inconvenient-truth-about-web-certificates\/","url_meta":{"origin":703,"position":5},"title":"WEIS 2011 :: Session 2 :: Identity :: The Inconvenient Truth About Web Certificates","author":"hrbrmstr","date":"2011-06-14","format":false,"excerpt":"Nevena Vratonjic Julien Freudiger Vincent Bindschaedler Jeane-Pierre Hubaux Presentation [PDF] Twitter transcript #weis2011 Overview of basic ssl\/tls\/https concepts. Asking: how prevalent is https, what are problems with https? #weis2011 Out of their large sample, only 1\/3 (34.7%) have support for https, login is worse! only 22.6% < #data! #weis2011 (me)\u2026","rel":"","context":"In &quot;Certificates&quot;","block_context":{"text":"Certificates","link":"https:\/\/rud.is\/b\/category\/certificates\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/703","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/comments?post=703"}],"version-history":[{"count":0,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/703\/revisions"}],"wp:attachment":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/media?parent=703"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/categories?post=703"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/tags?post=703"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}