When an undesirable access occurs, you’re not limited to blocking access you can send an e-mail alert, run an AppleScript, visit a URL, log the attempt, delete a packet without notification, and do a great many other things too. You can define a deep hierarchy of rules, each containing a condition to check for (of which there are innumerable choices) and an action to take. If you have sufficient networking mojo (or the patience to spend hours reading and experimenting), there’s no end to the cleverness or complexity of behaviors you can construct. This rundown is merely the thinnest dusting of snow on the tip of the iceberg, however. The program can also detect signs of denial-of-service attacks, port scanning, worms, and other mischief, immediately taking corrective action without requiring manual configuration-and without preventing desirable network access from occurring normally. Because it would be unusual (and potentially unsafe) for the typical Mac user to be running a telnet server, IPNetSentryX assumes that any machine contacting your Mac in this way is up to no good, and it immediately adds the putative attacker’s IP address to a trigger list, completely blocking it from further access to any port on your Mac. IPNetSentryX can do all that too, in approximately the same way, but by default it takes a slicker approach: it constantly watches for various kinds of suspicious behavior and, when it occurs, instantly blocks the offending IP address from accessing a particular port or, in some cases, all ports.įor example, a built-in rule watches for any computer trying to make a telnet connection to your Mac. Conventional firewalls usually start by disallowing all access, and then let the user selectively make exceptions for certain kinds of traffic on certain ports-for example, allowing SSH (secure shell) connections on port 22 for remote logins, or AFP (AppleTalk Filing Protocol) connections on port 548 for personal file sharing conventional firewalls can also allow only certain IP addresses to access any port. The program from Sustainable Softworks has every bell and whistle that even the geekiest Mac user could hope for-and a complex user interface to match.Īlthough IPNetSentryX is a sort of jack of all trades when it comes to firewall software (which also includes monitoring, filtering, logging, notification, and bridging features), its most salient distinguishing characteristic is that it uses adaptive rather than fixed rules. IPNetSentryX stands at the opposite end of the firewall software spectrum. At most you can specify programs and services (such as file sharing and screen sharing) to which outside connections are explicitly permitted or blocked. ![]() Leopard, though, the firewall-which is disabled by default-offers very little in the way of customization. ![]() Spamphibian Admin and Spamphibian Gateway are now Universal Binaries, able to run natively on Mac OS X PowerPC and Intel-based Macs.OS X includes a basic firewall that helps to protect your Mac from a variety of outside intruders, such as hackers trying to run spam-spewing robots. Spamphibian 1.2: spam fighting tool for any email server. If that fails, we'll just drop the reference instead of failing to load the file at all. Now, if a named style isn't found with a given unique identifier, we'll fall back to looking up by name. The new release fixes a failure to load files with corrupted named style references. OmniOutliner Pro 3.6.2b1: outline and organize thoughts, tasks, projects. The new release adds Sony Ericsson W850 support. Sony Ericsson iSync Plugins 1.1: sync Sony Ericsson mobile phones. The new release has engine and DAT separation during Update: The product will automatically download the necessary Engine or DAT during an Update process. McAfee VirusScan 8.5 (build 263): virus protection utility (was Virex). IDefrag 1.5.2: defragmentation and disk optimization.įont Pilot 2.1.3: font viewer which can view fonts which aren't installed. The new release fixes Ethernet Bridging on Intel-based Macs. IPNetSentryX 1.5b3: watches for and blocks suspicious network behavior.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |