• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Part: VI Server and Network Administrati... > Accessing and Controlling Tiger Remo...

Chapter 21. Accessing and Controlling Tiger Remotely

IN THIS CHAPTER

Apple advertises that with Mac OS X, you now have the power of Unix. With the power of Unix also come some unfamiliar security issues. Many Unix machines run various types of services, such as Telnet, that increase your machine's vulnerability to attacks from crackers. In general, crackers are interested in either wiping your machine or installing a packet sniffer that saves passwords transmitted on your network for future devious uses. To keep your machine most secure, you should not hook it up to the Internet. That solution is rather impractical in an age in which Internet communication is one of the many reasons why people buy computers. Therefore, it becomes your responsibility to pay attention to security issues, if not for yourself, for the other machines on your network.


PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint