Tiny Deathstars of Foulness

If you’re interested in Mac Security, the next edition of my Enterprise Mac Security book is now shipping. You can get it here The book is shipping from 3rd party sellers, but should ship directly from Amazon soon at the regular price. I don’t usually know exactly when, but it should also appear for Kindle and on the Apple Books store as well. Hope you enjoy! Screen Shot 2016-01-11 at 8.27.19 PM

January 12th, 2016

Posted In: Mac OS X, Mac OS X Server, Mac Security

Tags: , , , , ,

Two-factor verification on your AppleID helps to keep everything nice and secure. Once enabled, you will need any two  of the following to access your iCloud account: The password to your Apple ID, a device trusted in the portal (we’ll trust devices during this process) or a recovery key (which we’ll create during this process). In other words, don’t loose your recovery key! Learn To Enable Two-Factor Verification to Secure your AppleID On The Bushel Blog

May 10th, 2015

Posted In: Bushel

Tags: , , ,

For those of you who say Apple doesn’t care about the enterprise, Apple has released a number of assets (technical white papers) on integrating Macs (Lion) into enterprise environments at This is also the page that you’ll find links to all of the official training and certification courses for Lion. The assets up on this page are about as close to a publicly accessible book on integrating OS X into the enterprise as you’ll to see for Lion… The first covers the basics of integrating Macs into enterprise environments:

The second covers self support:

The third is on evaluating Macs in Enterprise environments:

The fourth is on deployment:

The fifth is on integrating with Active Directory:

The sixth is on managing Macs with Configuration Profiles:

The seventh is on OS X Security:

The last of the papers is on 802.1x authentication:

May 21st, 2012

Posted In: Active Directory, Articles and Books, iPhone, Mac OS X, Mac OS X Server, Mac Security, Mass Deployment, Microsoft Exchange Server

Tags: , , , , , , ,

I recently wrote up an article on some of the new malware safeguards in Snow Leopard. Well, turns out some people want to disable some of it. So you know the prompt that you are downloading an application that then asks you if you want to open it since it’s been quarantined. Well, you can disable it (not that you should but I’ve seen a couple of cases now where I needed to. To do so you’re going to place an LSQuarantine key into the To do so, run:
defaults write LSQuarantine -bool NO
To set it back to normal:
defaults write LSQuarantine -bool YES

February 8th, 2010

Posted In: Mac OS X, Mac Security

Tags: , , ,

A hashing function is used to calculate a hash value.  If you insert a file into a hashing function then it should produce a value that is almost certain to be unique (there’s always the remote likelihood that no matter how good your function, you may end up with a duplicate).   The openssl command is used to access a number of functions/ciphers including sha1, base64, md5, rc4/rc5 and of course des/des3.  It is a very simple command to use, simply provide the cipher, followed by the path to the file you would like to get a hash value (aka digest) for.  So if I have a file called myfile.txt and I would like to get a digest for it I could just use the following command: openssl md5 myfile.txt At its most basic level, we’re just leveraging openssl to grab digests quickly and easily.

March 27th, 2009

Posted In: Mac OS X, Mac OS X Server, Mac Security

Tags: , , , , ,

Every hardware network adapter has a unique MAC address.  However, they’re not always what they seem.  According to Wikipedia:
MAC Spoofing is a hacking technique of changing an assigned Media Access Control (MAC) address of a networked device to a different one. The changing of the assigned MAC address may allow the bypassing of access control lists on servers or routers, either hiding a computer on a network or allowing it to impersonate another computer.
I was talking to someone the other day about security and the topic of spoofing MAC addresses came up.  They seemed to discount that this was usually a concern except for in super secure environments because they considered it an extremely complex process.  Here’s my answer to that:
ifconfig en0 ether 00:00:00:00:00:00 
That should take you about 5 seconds to copy to your clipboard and paste into a terminal window…  You can then replace the en0 with whichever adapter you’d like to implement the spoofed addy on, and hopefully the series of zero’s here with the actual MAC address of a target host.  The next comment was that it was really hard to figure out a MAC address and that’s what makes it hard to spoof them.  If it’s local and you can ping it then arp will cache it.  Therefore, see the IP of the host you’d like to spoof the MAC on in your arp cache with a little:
arp -a
Which gives you something like:
? ( at 0:16:cb:aa:dc:58 on en1 [ethernet]
Now, once you’ve set the MAC, you’ll need to reboot to undo it.  Or just set it back if you copied it before running the earlier command.

March 10th, 2009

Posted In: Mac OS X, Mac OS X Server, Mac Security

Tags: , , , ,

Article on the 10 Most Mysterious Cyber Crimes:,2817,2331225,00.asp

October 1st, 2008

Posted In: Mac Security

Tags: , ,

dsconfigad did not support signing of LDAP packets in 10.4.x.  However, this was an upgrade that was introduced in the 10.5 version of the AD Plug-in.  Provided that your Active Directory environment uses LDAP signing, a standard policy with DCs, you can mirror your settings on the DC in dsconfigad by using the -packetsigning option followed by either an allow, disable or require variable.  To force LDAP signing, just run the following command: dsconfigad -packetsigning required To then disable signing if your environment doesn’t support it use the following command: dsconfigad -packetsigning disable The default variable is allow, which will use LDAP signing when possible.

September 27th, 2008

Posted In: Active Directory, Mac OS X, Mac OS X Server, Mac Security, Mass Deployment, Windows Server

Tags: , , , ,

New Apple security update.  Not that it fixes everything it intends but it’s a good start…

August 16th, 2008

Posted In: Mac OS X, Mac OS X Server

Tags: , ,

You can use the adplugin to customize the amount of time a client is trusted by Active Directory.  It can be done by using the following command: dsconfigad -passinterval 30

August 14th, 2008

Posted In: Active Directory, Mac OS X, Mac OS X Server, Mac Security

Tags: , , , ,

Next Page »