I use multiple Mac workstations to manage all my systems and services
(AWS infrastructure, Kubernetes) so it is a challenge to manage the
keys and credentials needed to access those systems. YADM (Yet Another Dotfiles Manager) \<https://thelocehiliosan.github.io/yadm/\>__ does
a great job of managing this files and storing them in a git repository
but I wasn't comfortable hosting that repository on a public facing
service (Github or Gitlab) so I took advantage of Keybase's private
encrypted git repo
feature.
This is a very cool little app that I found after listening to Security
Now Episode 233: Let's Design a Computer. Some
of the basic circuits were hard to visualize and this app kind of brings
them to life with animated current flow and some interactivity. For the
podcast you'll want to look in the Circuits menu for the Logic
Families/RTL for the circuits being discussed.
This java applet is an electronic circuit simulator. When the applet
starts up you will see an animated schematic of a simple LRC circuit.
The green color indicates positive voltage. The gray color indicates
ground. A red color indicates negative voltage. The moving yellow dots
indicate current.
| httpd: Syntax error on line 484 of /private/etc/apache2/httpd.conf:
Syntax error on line 3 of /private/etc/apache2/other/mod_jk.conf: \
| Cannot load /usr/libexec/apache2/mod_jk.so into server: \
| dlopen(/usr/libexec/apache2/mod_jk.so, 10): no suitable image found.\
| Did find:\n\t\
| /usr/libexec/apache2/mod_jk.so: mach-o, but wrong architecture
This error is because apache is compiled as a 64 bit executable and
configure builds a 32 bit shared library
Here is a collection of security tools that you should look through to
add to your arsenal to help keep the peace on your pc/network or unleash
war on others for whatever reason.
| Most of these are command line tools which need to be invoked via the
Terminal:
| Applications->Accessories->Terminal
| Apple - Support - Security Configuration
Guides
| The Security Configuration Guides provide an overview of features in
Mac OS X that can be used to enhance security, known as hardening your
computer.
The guides are designed to give instructions and recommendations for
securing Mac OS X and for maintaining a secure computer.
To use these guides, you should be an experienced Mac OS X user, be
familiar with the Mac OS X user interface, and have at least some
experience using the Terminal application’s command-line interface. You
should also be familiar with basic networking concepts.
Respondents were allowed to list open source or commercial tools on any
platform. Commercial tools are noted as such in the list below. Many of
the descriptions were taken from the application home page or the Debian
or Freshmeat package descriptions. I removed marketing fluff like
"revolutionary" and "next generation". No votes for the Nmap
Security Scanner were counted because the survey was taken on an Nmap
mailing list. This audience also means that the list is slightly biased
toward "attack" tools rather than defensive ones.
I have yet to find an application that detects adware and spyware before
it's installed on your PC, so my recommendation is not to pay for
adware/spyware removal software at this time. Simply use a combination
of Ad-aware (freeware version) and Spybot - Search & Destroy to remove
the offending software. I believe Norton is on the right track by
combining antivirus software with adware/spyware-detection. With
automatic updates and real-time detection, Norton could prove to be the
ultimate removal tool for viruses, adware, and spyware. Only time will
tell, and I'm sure McAfee has something up its sleeve as well.
| Affected Software
| Mac OS X 10.3 (all versions through at least 26-Nov-2003)
| Mac OS X Server 10.3 (all versions through at least 26-Nov-2003)
| Mac OS X 10.2 (all versions through at least 26-Nov-2003)
| Mac OS X Server 10.2 (all versions through at least 26-Nov-2003)
| Probably earlier versions of Mac OS X and Mac OS X Server
| Possibly developer seeded copies of future versions of Mac OS X