Share this Page URL

Chapter 9. Network Setup > Summary - Pg. 357

Network Setup 357 the current performance of the Port Scan tool. There are better ways of examining your own machine (netstat, at the command line for one), and it doesn't appear that the Port Scan tool provides reliable information. Additionally, it is considered to be excruciatingly bad form to portscan someone else's computer. This is exactly the methodology that crackers use to examine a machine for known vulnerabilities. We'd go so far as to say that it is a bit irresponsible of Apple to have put this tool in a user-level GUI application, and we recommend that you not use it, except on your own devices. Scanning a host without permission can be considered an attempted break-in, and could result in legal action against you. Figure 9.33. The (incorrect in this case) output of the Port Scan tool of the Network Utility application. Summary Linux and Unix operating systems have a history of being difficult to configure for online use. Users must often understand the complexities of TCP/IP to correctly set up their devices. Mac OS X puts a clean, user-friendly interface on network setup and enables the user to get online without ever seeing a command line. This chapter covered the Mac OS X network configuration utilities, and how they can be used to create a connection through modem, Ethernet, and wireless interfaces. Macintosh users are ac- customed to quickly and easily finding and connecting to network resources. Although the interface has changed, the process is just as easy.