krypted January 12th, 2016
Posted In: Mac OS X, Mac OS X Server, Mac Security
Tags: 10.11 security, Apple security, Book, education, el capitan, Mac Security
krypted May 10th, 2015
Posted In: Bushel
Tags: 2 factor authentication, Apple ID, iCloud, Mac Security
The second covers self support:
The third is on evaluating Macs in Enterprise environments:
The fourth is on deployment:
The fifth is on integrating with Active Directory:
The sixth is on managing Macs with Configuration Profiles:
The seventh is on OS X Security:
The last of the papers is on 802.1x authentication:
krypted May 21st, 2012
Posted In: Active Directory, Articles and Books, iPhone, Mac OS X, Mac OS X Server, Mac Security, Mass Deployment, Microsoft Exchange Server
Tags: Active Directory, Apple, Lion, Mac OS X, Mac Security, mountain lion, technical, white papers
defaults write com.apple.LaunchServices LSQuarantine -bool NOTo set it back to normal:
defaults write com.apple.LaunchServices LSQuarantine -bool YES
krypted February 8th, 2010
Posted In: Mac OS X, Mac Security
Tags: LaunchServices, LSQuarantine, Mac OS X, Mac Security
krypted March 27th, 2009
Posted In: Mac OS X, Mac OS X Server, Mac Security
MAC Spoofing is a hacking technique of changing an assigned Media Access Control (MAC) address of a networked device to a different one. The changing of the assigned MAC address may allow the bypassing of access control lists on servers or routers, either hiding a computer on a network or allowing it to impersonate another computer.I was talking to someone the other day about security and the topic of spoofing MAC addresses came up. They seemed to discount that this was usually a concern except for in super secure environments because they considered it an extremely complex process. Here’s my answer to that:
ifconfig en0 ether 00:00:00:00:00:00That should take you about 5 seconds to copy to your clipboard and paste into a terminal window… You can then replace the en0 with whichever adapter you’d like to implement the spoofed addy on, and hopefully the series of zero’s here with the actual MAC address of a target host. The next comment was that it was really hard to figure out a MAC address and that’s what makes it hard to spoof them. If it’s local and you can ping it then arp will cache it. Therefore, see the IP of the host you’d like to spoof the MAC on in your arp cache with a little:
arp -aWhich gives you something like:
? (192.168.210.249) at 0:16:cb:aa:dc:58 on en1 [ethernet]Now, once you’ve set the MAC, you’ll need to reboot to undo it. Or just set it back if you copied it before running the earlier command.
krypted March 10th, 2009
Posted In: Mac OS X, Mac OS X Server, Mac Security
Tags: Hacking, MAC Address, Mac OS X, Mac Security, MAC Spoofing
krypted October 1st, 2008
Posted In: Mac Security
Tags: Cyber Crime, Mac Security, Security
krypted September 27th, 2008
Posted In: Active Directory, Mac OS X, Mac OS X Server, Mac Security, Mass Deployment, Windows Server
Tags: Command line, dsconfigad, Mac OS X, Mac Security, packet signing
krypted August 16th, 2008
Posted In: Mac OS X, Mac OS X Server
Tags: DNS Poisoning, Mac OS X, Mac Security