A Photography forum. PhotoBanter.com

If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below.

Go Back   Home » PhotoBanter.com forum » Digital Photography » Digital Photography
Site Map Home Register Authors List Search Today's Posts Mark Forums Read Web Partners

Effective defenses against malware and other threats on Applecomputers



 
 
Thread Tools Display Modes
  #21  
Old May 14th 18, 08:18 AM posted to alt.computer.workshop,rec.photo.digital,comp.sys.mac.system,comp.sys.mac.apps
David B.[_2_]
external usenet poster
 
Posts: 184
Default Effective defenses against malware and other threats on Applecomputers

On 14/05/2018 01:35, Tyrone F. Horneigh wrote:
On 5/13/18 4:09 AM, David B. wrote:

I've no doubt forgotten more about computers that you have ever learned!


You wish.


Oh dear. :-( Seems I got that wrong. My apologies.

The strange thing is, my computer seems to be working perfectly WITHOUT
that script you mention. There's a question about it he-

https://www.bleepingcomputer.com/for...k-my-question/

Can YOU answer it?

Btw, your 'handle' meant absolutely nothing to me until just now!

https://en.wikipedia.org/wiki/Arte_Johnson


Discuss the EBCDIC character set differences between an IBM 129
keypunch/verifier and a Honeywell 200 mainframe.

What is the difference between a JP and JR instruction in Z80 assembly,
and why would you use one over the other?

Wire wrapping a computer board was a slow and error-prone process, but
the end result had a distinct advantage over printed circuits at the
time.** What was that?

What were the pros and cons of 8 inch floppy drives, compared to 5.25 inch?

What is a logic probe?

Why did Apple switch processors in 2005?

What is the purpose of the following code?

##
# Common setup for startup scripts.
##
# Copyright 1998-2002 Apple Computer, Inc.
##

#######################
# Configure the shell #
#######################

##
# Be strict
##
#set -e
set -u

##
# Set command search path
##
PATH=/bin:/sbin:/usr/bin:/usr/sbin:/usr/libexec:/System/Library/CoreServices;
export PATH

##
# Set the terminal mode
##
#if [ -x /usr/bin/tset ] && [ -f /usr/share/misc/termcap ]; then
#*** TERM=$(tset - -Q); export TERM
#fi

####################
# Useful functions #
####################

##
# Determine if the network is up by looking for any non-loopback
# internet network interfaces.
##
CheckForNetwork()
{
*** local test

*** if [ -z "${NETWORKUP:=}" ]; then
*** test=$(ifconfig -a inet 2/dev/null | sed -n -e '/127.0.0.1/d' -e
'/0.0.0.0/d' -e '/inet/p' | wc -l)
*** if [ "${test}" -gt 0 ]; then
******* NETWORKUP="-YES-"
*** else
******* NETWORKUP="-NO-"
*** fi
*** fi
}

alias ConsoleMessage=echo

##
# Process management
##
GetPID ()
{
*** local program="$1"
*** local pidfile="${PIDFILE:=/var/run/${program}.pid}"
*** local**** pid=""

*** if [ -f "${pidfile}" ]; then
*** pid=$(head -1 "${pidfile}")
*** if ! kill -0 "${pid}" 2 /dev/null; then
******* echo "Bad pid file $pidfile; deleting."
******* pid=""
******* rm -f "${pidfile}"
*** fi
*** fi

*** if [ -n "${pid}" ]; then
*** echo "${pid}"
*** return 0
*** else
*** return 1
*** fi
}

##
# Generic action handler
##
RunService ()
{
*** case $1 in
***** start* ) StartService** ;;
***** stop** ) StopService*** ;;
***** restart) RestartService ;;
***** ****** ) echo "$0: unknown argument: $1";;
*** esac
}



--

A real puzzle to *ME* - how can my Apple computer work *without* it?!!!

I have found this, but it doesn't answer my question - or does it? ;-)

https://scriptingosx.com/2018/02/set...th-in-scripts/

--
David B.
  #22  
Old May 14th 18, 01:31 PM posted to rec.photo.digital
David B.[_2_]
external usenet poster
 
Posts: 184
Default Effective defenses against malware and other threats on Applecomputers

On 14/05/2018 12:54, Whisky-dave wrote:
On Friday, 11 May 2018 18:53:12 UTC+1, David B. wrote:
On 11/05/2018 18:21, Frozen North wrote:
On 2018-05-11 12:42 PM, David B. wrote:
On 11/05/2018 17:33, Frozen North wrote:
On 2018-05-11 5:04 AM, David B. wrote:
Summary:

Use common sense and caution when you use your Mac, just like you
would in any social context. There is no product, utility, or magic
talisman that can protect you from all the evils of mankind!

*

There will always be threats to your information security associated
with using any Internet-connected communications tool:

1. You can mitigate those threats by following commonsense practices.

2. Delegating that responsibility to software is an ineffective
defense!

3. Assuming that any product will protect you from those threats is
a hazardous attitude that is likely to result in neglecting point #1
above.

Do you rely on your wife for protecting your iMac, we all know you
have absolutely zero common sense?

No. My wife never uses my iMac.

You do not trust her with it?* She must be smarter than you.


Of course I'd trust her with it, but she prefers to use her iPad.

Mind you, there been some interesting events involving the use of
computers in 'The Bridge' of late. Have you watched it?
http://nordicnoir.tv/tv-shows/the-bridge/


I haven't and I could quite understand the Synopsis.

During a blackout, the body of a woman is found in the middle of the Øresund Bridge, between Sweden and Denmark. Half of it belongs to a Swedish politician, the other half to a Danish prostitute.
I;m confused.


I can wholeheartedly recommend the series, Dave. Series 4 has just
started on BBC TV. In the last month, though, my wife and I have watched
all of Series 1 and 2 and now most of Series 3. Gripping stuff, all
available available on iPlayer!

https://www.bbc.co.uk/iplayer/episod...es-1-episode-1

To investigate the cases we've seen, there are detectives from both
Sweden and Denmark working together as a team and active in both countries.

But just because somethings shown on TV it doesn't mean it's real or possible.


Agreed - but in the scenario I was thinking of it *IS* possible to view
activity in an adjacent property from the comfort of ones own home -
images from video cameras in the nearby property being shown on a
computer screen in ones study/den.

I don't want to give away what actually happens!

  #23  
Old May 14th 18, 05:34 PM posted to rec.photo.digital
David B.[_2_]
external usenet poster
 
Posts: 184
Default Effective defenses against malware and other threats on Applecomputers

On 14/05/2018 14:50, Whisky-dave wrote:
On Monday, 14 May 2018 13:32:01 UTC+1, David B. wrote:
On 14/05/2018 12:54, Whisky-dave wrote:
On Friday, 11 May 2018 18:53:12 UTC+1, David B. wrote:
On 11/05/2018 18:21, Frozen North wrote:
On 2018-05-11 12:42 PM, David B. wrote:
On 11/05/2018 17:33, Frozen North wrote:
On 2018-05-11 5:04 AM, David B. wrote:
Summary:

Use common sense and caution when you use your Mac, just like you
would in any social context. There is no product, utility, or magic
talisman that can protect you from all the evils of mankind!

*

There will always be threats to your information security associated
with using any Internet-connected communications tool:

1. You can mitigate those threats by following commonsense practices.

2. Delegating that responsibility to software is an ineffective
defense!

3. Assuming that any product will protect you from those threats is
a hazardous attitude that is likely to result in neglecting point #1
above.

Do you rely on your wife for protecting your iMac, we all know you
have absolutely zero common sense?

No. My wife never uses my iMac.

You do not trust her with it?* She must be smarter than you.

Of course I'd trust her with it, but she prefers to use her iPad.

Mind you, there been some interesting events involving the use of
computers in 'The Bridge' of late. Have you watched it?
http://nordicnoir.tv/tv-shows/the-bridge/

I haven't and I could quite understand the Synopsis.

During a blackout, the body of a woman is found in the middle of the Øresund Bridge, between Sweden and Denmark. Half of it belongs to a Swedish politician, the other half to a Danish prostitute.
I;m confused.


I can wholeheartedly recommend the series, Dave. Series 4 has just
started on BBC TV.


I;m a bit fed up with police type dramas there's so many of them.

In the last month, though, my wife and I have watched
all of Series 1 and 2 and now most of Series 3. Gripping stuff, all
available available on iPlayer!

https://www.bbc.co.uk/iplayer/episod...es-1-episode-1

To investigate the cases we've seen, there are detectives from both
Sweden and Denmark working together as a team and active in both countries.


Not sure if I want to commit to another drawn out cop drama lastign god knows how long.


The last series - 4 - is going to be the LAST (so I've read).

I;m still confused by this :-
During a blackout, the body of a woman is found in the middle of the Øresund Bridge, between Sweden and Denmark. Half of it belongs to a Swedish politician, the other half to a Danish prostitute.
I'm confused.
Is it the bridge that one half belongs Swedish politician and the other half the Danish prostitute or are we talking about two halves of this one corpse ?


Ah! We're talking about the corpse! ;-)

I found this which may help you:-

• The bodies of Kerstein Ekwell, the chairman of Malmo council and
Monique Brammer, a prostitute and drug addict, are found in the middle
of the Oresund bridge joining Denmark and Sweden after a 48-second blackout.

• Ekwell went missing between 6.30pm and midnight, when her body was
found. She was seen getting into a black Cadillac from which her body
was dumped.

• Brammer went missing 13 months ago, but after a police operation in
which just two prostitutes and a neighbour were interviewed, the case
was shelved.

• Both were cut in half at a Copenhagen slaughterhouse. Brammer's body
was put in a deep freeze.

• The murderer used the car of the deeply unpleasant journalist Daniel
Ferbé, in which he (or possibly she?) then planted a fake bomb and a CD
with a message for the police.

• The murderer set up Swedish and Danish websites to spread his message
– that we are not equal before the law. The servers were traced back to
Copenhagen Police Headquarters, at which point the sites were taken offline

• The message on the CD was recorded by an actor three-and-a-half years
ago, using a script left in a PO Box.

• A note found with the other half of Ekwell's body said: "Had there
been no victims, you would have found no victims."

• Danish detective Martin Rohde has found Brammer's diary.

• There are no clues on Ekwell's mobile, cards or computers.

• The murderer has now progressed to poisoning homeless people by
leaving bottles of wine on street corners.

• He sent Ferbé statistics on homelessness – telling the journalist he
was "a protector of truth".


But just because somethings shown on TV it doesn't mean it's real or possible.


Agreed - but in the scenario I was thinking of it *IS* possible to view
activity in an adjacent property from the comfort of ones own home -
images from video cameras in the nearby property being shown on a
computer screen in ones study/den.


I've just been watching my cat at home on the table from my workplace.
Hardly 'new' tech .


There ya go! ;-)

I don't want to give away what actually happens!


Dontl do that in case I decide to give it a try.


OK :-)

To be absolutely honest, I didn't watch the first two episodes and only
sat to watch the rest at the insistence of my wife. I've found it
gripping - you'll soon discover if you like it; you may end up like us -
watching 3 or 4 episodes at one sitting!

Cheers!

--
D.

  #24  
Old May 15th 18, 10:23 AM posted to rec.photo.digital
David B.[_2_]
external usenet poster
 
Posts: 184
Default Effective defenses against malware and other threats on Applecomputers

On 15/05/2018 09:51, Whisky-dave wrote:
On Monday, 14 May 2018 17:34:29 UTC+1, David B. wrote:
On 14/05/2018 14:50, Whisky-dave wrote:
On Monday, 14 May 2018 13:32:01 UTC+1, David B. wrote:
On 14/05/2018 12:54, Whisky-dave wrote:
On Friday, 11 May 2018 18:53:12 UTC+1, David B. wrote:
On 11/05/2018 18:21, Frozen North wrote:
On 2018-05-11 12:42 PM, David B. wrote:
On 11/05/2018 17:33, Frozen North wrote:
On 2018-05-11 5:04 AM, David B. wrote:
Summary:

Use common sense and caution when you use your Mac, just like you
would in any social context. There is no product, utility, or magic
talisman that can protect you from all the evils of mankind!

*

There will always be threats to your information security associated
with using any Internet-connected communications tool:

1. You can mitigate those threats by following commonsense practices.

2. Delegating that responsibility to software is an ineffective
defense!

3. Assuming that any product will protect you from those threats is
a hazardous attitude that is likely to result in neglecting point #1
above.

Do you rely on your wife for protecting your iMac, we all know you
have absolutely zero common sense?

No. My wife never uses my iMac.

You do not trust her with it?* She must be smarter than you.

Of course I'd trust her with it, but she prefers to use her iPad.

Mind you, there been some interesting events involving the use of
computers in 'The Bridge' of late. Have you watched it?
http://nordicnoir.tv/tv-shows/the-bridge/

I haven't and I could quite understand the Synopsis.

During a blackout, the body of a woman is found in the middle of the Øresund Bridge, between Sweden and Denmark. Half of it belongs to a Swedish politician, the other half to a Danish prostitute.
I;m confused.

I can wholeheartedly recommend the series, Dave. Series 4 has just
started on BBC TV.

I;m a bit fed up with police type dramas there's so many of them.

In the last month, though, my wife and I have watched
all of Series 1 and 2 and now most of Series 3. Gripping stuff, all
available available on iPlayer!

https://www.bbc.co.uk/iplayer/episod...es-1-episode-1

To investigate the cases we've seen, there are detectives from both
Sweden and Denmark working together as a team and active in both countries.

Not sure if I want to commit to another drawn out cop drama lastign god knows how long.


The last series - 4 - is going to be the LAST (so I've read).


OK that's useful to know, as long as it;s not like game of throngs in that it never seems to end glad I avoided that one, and the one set on an island 'Lost' that was the in thing a few years ago.


Just be careful looking up detail on-line. There's lots of 'spoilers'
which you do NOT want to see if you do choose to watch the series.

I too got hooked on Lost - never did get to see the end! ;- ))

I;m still confused by this :-
During a blackout, the body of a woman is found in the middle of the Øresund Bridge, between Sweden and Denmark. Half of it belongs to a Swedish politician, the other half to a Danish prostitute.
I'm confused.
Is it the bridge that one half belongs Swedish politician and the other half the Danish prostitute or are we talking about two halves of this one corpse ?


Ah! We're talking about the corpse! ;-)

I found this which may help you:-


cheers that helped.

• The bodies of Kerstein Ekwell, the chairman of Malmo council and
Monique Brammer, a prostitute and drug addict, are found in the middle
of the Oresund bridge joining Denmark and Sweden after a 48-second blackout.

• Ekwell went missing between 6.30pm and midnight, when her body was
found. She was seen getting into a black Cadillac from which her body
was dumped.

• Brammer went missing 13 months ago, but after a police operation in
which just two prostitutes and a neighbour were interviewed, the case
was shelved.

• Both were cut in half at a Copenhagen slaughterhouse. Brammer's body
was put in a deep freeze.

• The murderer used the car of the deeply unpleasant journalist Daniel
Ferbé, in which he (or possibly she?) then planted a fake bomb and a CD
with a message for the police.

• The murderer set up Swedish and Danish websites to spread his message
– that we are not equal before the law. The servers were traced back to
Copenhagen Police Headquarters, at which point the sites were taken offline

• The message on the CD was recorded by an actor three-and-a-half years
ago, using a script left in a PO Box.

• A note found with the other half of Ekwell's body said: "Had there
been no victims, you would have found no victims."

• Danish detective Martin Rohde has found Brammer's diary.

• There are no clues on Ekwell's mobile, cards or computers.

• The murderer has now progressed to poisoning homeless people by
leaving bottles of wine on street corners.

• He sent Ferbé statistics on homelessness – telling the journalist he
was "a protector of truth".


No this is confusing how to they know it's him putting out wine bottles when there;s no clue to who he is.
Maybe I'll get it if I watch it.


Don't leave it too long. I'm not sure how much longer it will be on iPlayer.

But just because somethings shown on TV it doesn't mean it's real or possible.

Agreed - but in the scenario I was thinking of it *IS* possible to view
activity in an adjacent property from the comfort of ones own home -
images from video cameras in the nearby property being shown on a
computer screen in ones study/den.

I've just been watching my cat at home on the table from my workplace.
Hardly 'new' tech .


There ya go! ;-)


I can now watch here sleep in HD :-D


I presume you refer to a female pussy cat?!!

I don't want to give away what actually happens!

Dontl do that in case I decide to give it a try.


OK :-)

To be absolutely honest, I didn't watch the first two episodes and only
sat to watch the rest at the insistence of my wife. I've found it
gripping - you'll soon discover if you like it; you may end up like us -
watching 3 or 4 episodes at one sitting!


I've dome that with a few series.

I Claudius, Battlestar Galatica, our friends in the north.


Haha! :-)

Take care.

--
D.

 




Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is Off
HTML code is Off
Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
OT - Macs are now being significantly targeted with malware Eric Stevens Digital Photography 5 March 17th 17 10:00 PM
Beware Oracle Java malware threat nospam Digital Photography 6 December 23rd 15 08:20 PM
Beware Oracle Java malware threat android Digital Photography 0 December 23rd 15 03:51 AM
Threats to rpd Lawrence Glickman Digital Photography 23 April 27th 08 11:04 AM
Threats to rpd Ron Hunter Digital Photography 3 April 23rd 08 07:47 AM


All times are GMT +1. The time now is 10:02 PM.


Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2018, Jelsoft Enterprises Ltd.
Copyright 2004-2018 PhotoBanter.com.
The comments are property of their posters.