![]() |
![]() |
#1 (permalink) |
Eponymous
Location: Central Central Florida
|
Can a Mac be hacked?
I always feel safe on my iMac G4.
Until now. My 14 year-old daughter did something silly that a specific group took personally and they've put out an alert that her "doors are open". One person did post a direct threat (I did report that) to get her ISP (what she said/did wasn't illegal, she broke a non-published rule and doesn't mind being banned if that's the consequence). She claims that they've hacked into other kids' computers and is totally petrified. Can they hurt Mac? I'm on a Comcast connection using the built-in ethernet. A local password is required through our router for the other computers to log onto our connection (I think?). I'm fairly computer-savvy but not very knowledgeable about networks and Airport, but am not sure if I need to be further protected. Any Mac advice? Thank you in advance.
__________________
We are always more anxious to be distinguished for a talent which we do not possess, than to be praised for the fifteen which we do possess. Mark Twain |
![]() |
![]() |
#2 (permalink) |
... a sort of licensed troubleshooter.
|
If you're worried about your IP, just download Peer Guardian and run it when you're browsing (or using p2p or torrents). They will not be able to get your IP address.
They almost certainly can't hack into your G4. Mac OS =! Windows OS. Edit: To put it in perspective, the FBI, CIA, and NSA are more likely to be successfully hacked than my or your Mac. Last edited by Willravel; 02-28-2008 at 03:38 PM.. |
![]() |
![]() |
#3 (permalink) |
Insane
Location: Lone Star State,USA
|
Anything is possible in the computer jungle but after buying an iMAC
I was asking the same questions about if any viruses were attacking the Apple computers. I was told there were no viruses known effecting Apple computers NOW. There is a free program called "CLAM Xav" you can download off the net. (Just google the name). I do have a problem with my iMAC. It's a 20" one and has been working fine for several months but lately I get Email messages with only the "TO and From" visable. After reloading the iMac with the operating system CD then everything is back to normal when the Email is checked again. Anybody know what is wrong? |
![]() |
![]() |
#5 (permalink) |
warrior bodhisattva
Super Moderator
Location: East-central Canada
|
I'm not sure about active targeting, but the company I work for has spent hours browsing on a Mac version of Internet Explorer no longer supported by Microsoft. This on old G4s. Never in the 4+ years have we had a single problem with viruses, trojans, DOS attacks, what have you.
I wouldn't be worried about it. Most people don't know how to launch OS X's file system locally let alone aggressively access it remotely.
__________________
Knowing that death is certain and that the time of death is uncertain, what's the most important thing? —Bhikkhuni Pema Chödrön Humankind cannot bear very much reality. —From "Burnt Norton," Four Quartets (1936), T. S. Eliot |
![]() |
![]() |
#6 (permalink) |
Eponymous
Location: Central Central Florida
|
Thank you SOOO much, WR and BG! I downloaded and activated the Peer Guardian as soon as I saw your post, Will.
You guys are the best!
__________________
We are always more anxious to be distinguished for a talent which we do not possess, than to be praised for the fifteen which we do possess. Mark Twain |
![]() |
![]() |
#7 (permalink) | |
... a sort of licensed troubleshooter.
|
Quote:
![]() BTW, lemme know who threatened her. A Mac may be impossible to get into but even a noob like me can get into many Windows machines. ![]() |
|
![]() |
![]() |
#8 (permalink) | |
Darth Papa
Location: Yonder
|
Quote:
|
|
![]() |
![]() |
#10 (permalink) | |
Mine is an evil laugh
Location: Sydney, Australia
|
Quote:
The fact of having Anti-virus scanners for Mac points to the ability to have compromised systems and means (IMO) that of course you can be hacked.
__________________
who hid my keyboard's PANIC button? |
|
![]() |
![]() |
#11 (permalink) | |
... a sort of licensed troubleshooter.
|
Quote:
BTW, Mac controls about 15% of the laptop market. |
|
![]() |
![]() |
#12 (permalink) | |
Darth Papa
Location: Yonder
|
Quote:
I used Windows for years and years, and I never bought a virus scanner. If you know what you're doing, you can stay clean--YOU'RE always the one to infect your own machine, at the end of the day. |
|
![]() |
![]() |
#13 (permalink) | |
Psycho
|
Quote:
However whether it's Windows or Unix, it still comes down to the person behind the keyboard, determining how they will compromise their security.
__________________
He who is void of virtuous attachments in private life is, or very soon will be, void of all regard for his country. There is seldom an instance of a man guilty of betraying his country, who had not before lost the feeling of moral obligations in his private connections. -Samuel Adams |
|
![]() |
![]() |
#14 (permalink) | |
Tilted Cat Head
Administrator
Location: Manhattan, NY
|
Quote:
As far as spoofing your IP address PeerGuardian does nothing of the sort, when I use PG I can't connect to work when I was as Viacom, or my present employer since both are on the list. There are programs that can provide that type of security of changing your IP address, but I won't go into it here. You are welcome to PM me if you are so concerned about your IP. IMO you really have little to worry about. Idle spoken threats of people who have seen too many movies.
__________________
I don't care if you are black, white, purple, green, Chinese, Japanese, Korean, hippie, cop, bum, admin, user, English, Irish, French, Catholic, Protestant, Jewish, Buddhist, Muslim, indian, cowboy, tall, short, fat, skinny, emo, punk, mod, rocker, straight, gay, lesbian, jock, nerd, geek, Democrat, Republican, Libertarian, Independent, driver, pedestrian, or bicyclist, either you're an asshole or you're not. |
|
![]() |
![]() |
#16 (permalink) |
spudly
Location: Ellay
|
Mac's are quite secure against viruses for the time being. That's partially due to the lower market share and partially due to the underpinnings of the OS. However, you are absolutely vulnerable to trojans. Moral of story: be absolutely sure that you know what you download and what you install.
__________________
Cogito ergo spud -- I think, therefore I yam |
![]() |
![]() |
#17 (permalink) | ||
Mine is an evil laugh
Location: Sydney, Australia
|
Quote:
![]() Quote:
__________________
who hid my keyboard's PANIC button? |
||
![]() |
![]() |
#18 (permalink) |
spudly
Location: Ellay
|
Well, trojans and viruses are really different -- it's just our lazy use of terminology that conflates them. A trojan has nothing to do with the vulnerability of the system, it relies on the ignorance of the user. A virus exploits weaknesses in the operating system or applications for malicious intent without necessarily having to exploit the user's ignorance or mistakes.
It is striking that while people have taken the time to develop trojans for OS X there have been no viruses of consequence. In fact, the fact that people have taken time to develop trojans undermines the classic argument that there are no viruses for OS X because the market share is too small for anyone to care. If anything, I'd figure that the prominence or "prestige" acquired by writing the first real OS X virus of consequence would be a big draw. Either it isn't, or doing such a thing is harder with macs. That said, Jewels, you should go into the sharing preference pane in system preferences and ensure that the OS firewall is enabled and that the only sharing items you have checked off are the ones that you want to be open.
__________________
Cogito ergo spud -- I think, therefore I yam |
![]() |
![]() |
#19 (permalink) | |
Eponymous
Location: Central Central Florida
|
Quote:
At least the PeerGuard will let me know if anyone's attempted access, ya? It does offer to show me a list of blocked addresses. BTW, most frequenters of this site are not kids. But Mac appearss fine and unintruded this morning.
__________________
We are always more anxious to be distinguished for a talent which we do not possess, than to be praised for the fifteen which we do possess. Mark Twain |
|
![]() |
![]() |
#20 (permalink) |
Tilted Cat Head
Administrator
Location: Manhattan, NY
|
PG will only show attempted scans of the blacklisted IPs which are entertainment and media companies.
Firewall logs would show if anyone attempts access. I can say that if you look at your logs you will ALWAYS see someone trying to access your computers. Hackers tend to look for IP addresses with port 21 open because that designates a potential FTP site. So you'll have a self fulfilling prophecy if you look at your logs, it doesn't necessarily mean it was these individuals.
__________________
I don't care if you are black, white, purple, green, Chinese, Japanese, Korean, hippie, cop, bum, admin, user, English, Irish, French, Catholic, Protestant, Jewish, Buddhist, Muslim, indian, cowboy, tall, short, fat, skinny, emo, punk, mod, rocker, straight, gay, lesbian, jock, nerd, geek, Democrat, Republican, Libertarian, Independent, driver, pedestrian, or bicyclist, either you're an asshole or you're not. |
![]() |
![]() |
#22 (permalink) | |
warrior bodhisattva
Super Moderator
Location: East-central Canada
|
Quote:
If Macs weren't special, there would be no reason to buy one. ![]()
__________________
Knowing that death is certain and that the time of death is uncertain, what's the most important thing? —Bhikkhuni Pema Chödrön Humankind cannot bear very much reality. —From "Burnt Norton," Four Quartets (1936), T. S. Eliot |
|
![]() |
![]() |
#23 (permalink) | |||
... a sort of licensed troubleshooter.
|
Quote:
Quote:
Quote:
|
|||
![]() |
![]() |
#24 (permalink) | |
Darth Papa
Location: Yonder
|
Quote:
Okay, you could make the case that somebody could scan you and attack services running on various ports, but there has been LOTS of attention paid to the services that are running behind the scenes in OSX, and so far no mention of viable attacks. And I'd even take the case that you're the one leaving the door open by running that service. MOST computer takeovers are a result of owner/user gullibility and ignorance, even on Windows. By most, I mean probably 99%. And most (like 99%) of attacks are designed to exploit gullibility and ignorance. EDUCATION IS THE ANSWER. |
|
![]() |
![]() |
#25 (permalink) | |
Junkie
|
Quote:
Honestly, there are VERY few people who can "hack into" any OS. The problem is what is running on the server ... not the OS. I think you'll need to do some studying about what hacking is. As the sysadmin (8 years) of a small college I can count the number of times we've been "hacked" on one hand: 1 - A Solaris 8 box was compromised; why? User error. It was a wide-open telnet server that was set up by a faculty member so he could connect to it from home. That's it. Solaris != Windows either. We have 40+ Windows 2003 servers ... none have been compromised as long as I've been here. I watch the IPAudit logs(a program that runs on top of MRTG on Redhat 7.3 box); I watch the firewall logs; I watch the Packeteer and Nitro (packet shaping devices) logs ... I see SCADS of attempts to infiltrate our network. None of them succeed. The fact is that "reward" for hacking a OSX Server is just a marketing ploy. No hardened system can EASILY be hacked (including Windows) ... Note: I said EASILY ... I didn't say it couldn't be done. A n00b would have a hard time at it. |
|
![]() |
![]() |
#26 (permalink) | |
... a sort of licensed troubleshooter.
|
Quote:
1) Find the myspace which contacted her 2) Check out the friends list of the guy (or girl), 3) Copy one of his friend's accounts 4) Send a private message from the copied account: "John forwarded this app to me. Is this legit?" with a link to a site like www.thunderbord.com. 5) The link sends him to a site I'm hosting, I see his IP. And I'm honestly a complete n00b. |
|
![]() |
![]() |
#27 (permalink) | |
Eponymous
Location: Central Central Florida
|
Quote:
__________________
We are always more anxious to be distinguished for a talent which we do not possess, than to be praised for the fifteen which we do possess. Mark Twain |
|
![]() |
![]() |
#28 (permalink) | |
Junkie
|
Quote:
It's relatively easy to see someone's IP address. You can go to several sites to see your own. To gain control (become root) of an OS is not easy to do without a lot of knowledge. EDIT: To gain control of a HARDENED OS is not easy to do without a lot of knowledge. Also, what you described is social hacking ... look up some of Mitnick's social hacking skillz. If you can gain the end user's trust then you've won 90% of the battle in gaining control of a system. It has nothing to do with the OS. If you trick someone into giving you control of your Mac then there you go. Anyone could win the $25,000 reward if they could get Apple to give them console access to the server. Remotely commandeering a modern OS (without permission) is difficult. Last edited by vanblah; 02-29-2008 at 12:05 PM.. |
|
![]() |
![]() |
#29 (permalink) |
Confused Adult
Location: Spokane, WA
|
I like vanblah
but then again I like anyone who doesn't display rabid fanaticism about an overmarketed OS/platform that is no more better/worse at what it's intended for than the competition. Same but different. if a computer can execute code, it can execute malicious code if a computer can offer a service, that service can be exploited and yeah, I have mitnick's "Art of Deception" very very good read. It really does display how trusting people are and how you use natural instinct against people to get what you want. Manipulative? yes, but in the world of computers, you tell them what you want every single time you click an icon, it's not that much different when interacting with people, its just song and dance to gain the desired outcome. You could even go so far as to apply it to the whole social "pick up" scene that seems to be all the rage these days. It's another degree of Social Engineering. |
![]() |
![]() |
#32 (permalink) | |
Junkie
|
Quote:
|
|
![]() |
![]() |
#34 (permalink) | |
Lover - Protector - Teacher
Location: Seattle, WA
|
Quote:
None of these have been hacked, in the sense that there was unauthorized access from outside. Securing these servers is actually a small part of my 40 hour week (20%). NONE of them are Macintosh. If they were, I think I'd be spending a lot longer than 20% of my time managing the different software suites across OSes. The "security" of an OS has very little to do with the OS itself - it has to do with the measures taken to harden them. An 'unhardened' RHEL3 server scares me just as much as an Windows 2003 SP1 machine, and Linux is supposedly the "secure" OS.
__________________
"I'm typing on a computer of science, which is being sent by science wires to a little science server where you can access it. I'm not typing on a computer of philosophy or religion or whatever other thing you think can be used to understand the universe because they're a poor substitute in the role of understanding the universe which exists independent from ourselves." - Willravel |
|
![]() |
![]() |
#35 (permalink) | |
Junkie
|
Don't think your computer is unbeatable lest it ends up like the Patriots.
You are the first line of defense on your computer, know what you are doing before you do it and take steps to secure any machine you don't want hacked (including a mac). Quote:
Here is a published paper on the exploit: http://uninformed.org/?v=8&a=4&t=sumry I skimmed it and it did not mention anything about requiring a 3rd party card and most recent news articles on it also mention that it works with the built in cards. I could be wrong and would be glad to know if you find proof that it was only doable via a 3rd party wireless card. Last edited by Rekna; 03-01-2008 at 11:41 PM.. Reason: Automerged Doublepost |
|
![]() |
![]() |
#37 (permalink) |
Mine is an evil laugh
Location: Sydney, Australia
|
I think the comparison between the average home user and professional network admins is hardly fair - I'd hope that most businesses/schools with a serious computer setup would be more secure than any home user.
The average home user has *no clue* what services are running and probably couldn't turn them off if they were running.
__________________
who hid my keyboard's PANIC button? |
![]() |
![]() |
#38 (permalink) | |
Junkie
|
Quote:
You just have to NOT click on the boobies in that email you got. I kind of think the same way about cars as I do computers. You don't have to know how to completely overhaul an engine; but you damn sure better no how to put gas in it; keep the oil changed and at least change a tire if you have to. If you don't ... you're just asking for trouble. There are people who have phobias about electronics. They feel they are stupid or whatever. There is a culture of ignorance that surrounds computers and I'm tired of it. I really don't have sympathy for someone who would drop $1500 on something and then not know how to work it. I feel the same way about someone who buys a nice car and then dogs it or doesn't know how to maintain it. But this thread has been jacked far enough I suppose. |
|
![]() |
![]() |
#39 (permalink) | |
Young Crumudgeon
Location: Canada
|
Quote:
The problem stems from the fact that computers are mysterious to most end users. They understand that there's some software and some hardware and that these two things put together allow them to browse the internet/look at boobs/play games/whatever other task. The exact processes that go into that are completely unknown to them. And because they don't know what's possible, anything seems plausible. Ask me some time why I got out of the IT business. I dare ya. Putting aside terminology discussions that aren't really relevant, hackers aren't as bad as most people seem to believe. I blame Hollywood, which has perpetuated the idea that a sufficiently knowledgeable individual can basically do whatever he wants with a computer. The reality is that working within computer systems comes with a set of rules. It doesn't matter how much of a mechanic I am, I can't make my car go 300 mph. And it doesn't matter how good of a 'hacker' I am, I simply can't break into a properly secured system. The rules don't let me. Since it's difficult to impossible, then, to fool the system, most of the attempts to crack a box are aimed at the user, who is relatively easy to fool. Kevin Mitnick was mentioned above. The man is a god amongst geeks. He's a geek superstar. And even he was noted more for his social engineering abilities than any prominent technical skills. I can't say it's impossible to break into a Mac running OS X. I know that OS X is based heavily on BSD and that's the extent of my knowledge on the subject, so I can't say that anything really in terms of what can and cannot be done. I do know, however, that there are people who keep an eye on this thing from both sides of the playing field and that if Apple was distributing an operating system with any serious vulnerabilities they'd probably get called on it pretty quick. Some script kiddie on a message board doesn't change that; these kids were probably just trying to intimidate your daughter. At best, they may have access to some of the more malicious software but even then it's probably more geared towards Windows than OS X (having been out of the security biz for a couple years now, I don't really know what's in vogue anymore and thus don't really feel confident enough to list specific examples). As long as you're intelligent about your usage, you'll be fine. A little education goes a long way.
__________________
I wake up in the morning more tired than before I slept I get through cryin' and I'm sadder than before I wept I get through thinkin' now, and the thoughts have left my head I get through speakin' and I can't remember, not a word that I said - Ben Harper, Show Me A Little Shame |
|
![]() |
![]() |
#40 (permalink) | |
Insane
Location: Lone Star State,USA
|
Problem with Email on my iMAC
Quote:
Email. RonRyan |
|
![]() |
Tags |
hacked, mac |
|
|