10 Ways to Not Get Caught Hacking On Your Mac



Similar documents
10 steps to better secure your Mac laptop from physical data theft

Using Mac OS X 10.7 Filevault with Centrify DirectControl

How to Password Protect Files & Folders in Mac OS X with Disk Images

Contents. Getting Started...1. Managing Your Drives Backing Up & Restoring Folders Synchronizing Folders Managing Security...

1. Product Information

Online Backup Client User Manual Linux

Online Backup Client User Manual Mac OS

Online Backup Client User Manual Mac OS

Online Backup Client User Manual

RecoveryVault Express Client User Manual

Online Backup Linux Client User Manual

Security for Mac Computers in the Enterprise

Online Backup Client User Manual

IDERA WHITEPAPER. The paper will cover the following ten areas: Monitoring Management. WRITTEN BY Greg Robidoux

In list view, the Finder window displays folder or volume contents as a list, which can be sorted by name, date, kind, or other criteria.

Online Backup Client User Manual

Sophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7

Apple Mac Fundamentals: A Tutorial. Updated 24/4/2013 By Mac Thing enquiries@macthing.co.uk Table of Contents:

AutoCrypt 2.1 User Guide!

How to enable Disk Encryption on a laptop

Digital Forensics. Larry Daniel

Symantec Endpoint Encryption (SEE Client) Installation Instructions. Version 8.2

Introweb Remote Backup Client for Mac OS X User Manual. Version 3.20

THE ARCHIVAL SECTOR IN DW2.0 By W H Inmon

Remote Administration

Seagate Business Storage 1-Bay, 2-Bay, and 4-Bay NAS User Guide

SVA Backup Plus Features

You're reading an excerpt. Click here to read official APPLE REMOTE DESKTOP 1.2 user guide

OS X - Quick Start Guide

Information Security. Annual Education Information Security Mission Health System, Inc.

BitLocker Drive Encryption

Step by step guide how to password protect your USB flash drive

Backing up with Windows 7

HP MediaSmart Server Software Upgrade from v.1 to v.3

Jetico Central Manager. Administrator Guide

Administering FileVault 2 on OS X Lion with the Casper Suite. Technical Paper July 2012

Installing and Upgrading to Windows 7

HP ProtectTools for Small Business Security Software, Version User Guide

Getting Started with Dynamic Web Sites

Clickfree C6 Easy Imaging October 24, 2011

Verbatim Secure Data USB Drive. User Guide. User Guide Version 2.0 All rights reserved

How To Backup Your Hard Drive With Pros 4 Technology Online Backup

Introduction. Ease-of-Use

How To Use An Apple Macbook With A Dock On Itunes Macbook V.Xo (Mac) And The Powerbar On A Pc Or Macbook (Apple) With A Powerbar (Apple Mac) On A Macbook

View CPU, Memory, Disk, and Network Usage in Activity Monitor.

Windows 7 for beginners

Total Backup Recovery 7

Easily integrate Mac into Microsoft System Center

Industrial Flash Storage Trends in Software and Security

Here is a guide on how to encrypt a part of your USB flash drive and access it on any computer:

Computer Forensic Tools. Stefan Hager

MAC/OSX - How to Encrypt Data using TrueCrypt. v

IceWarp to IceWarp Server Migration

RFG Secure FTP. Web Interface

Determining VHD s in Windows 7 Dustin Hurlbut

Backing up your digital image collection provides it with essential protection.

Backups. Backup Plan. How to use the Backup utility to back up files and folders in Windows XP Home Edition

The virtual safe: A user-focused approach to data encryption

2.6.1 Creating an Acronis account Subscription to Acronis Cloud Creating bootable rescue media... 12

Accessing Staff and Student VMs Using VMware View

Outlook Data File navigate to the PST file that you want to open, select it and choose OK. The file will now appear as a folder in Outlook.

Total Backup Recovery 7

If you re the unofficial administrator of your home or small

Total Backup Recovery 7

Online Backup Solution Features

RAID Utility User s Guide Instructions for setting up RAID volumes on a computer with a MacPro RAID Card or Xserve RAID Card.

How to Encrypt your Windows 7 SDS Machine with Bitlocker

Yale Software Library

How Drive Encryption Works

Mac Basics: Time Machine backs up your Mac

CONNECT-TO-CHOP USER GUIDE

Welcome to Panther Find out what you can do with Mac OS X and Mac OS X applications

Cloud Backup Express

Forensically Determining the Presence and Use of Virtual Machines in Windows 7

WINDOWS 7 & HOMEGROUP

User Guide. Laplink Software, Inc. Laplink DiskImage 7 Professional. User Guide. UG-DiskImagePro-EN-7 (REV. 5/2013)

Shortcuts and Tips for Leopard/Windows XP on the Intel Mac

Cleaning your Windows 7, Windows XP and Macintosh OSX Computers

Welcome to Enterprise Vault Archiving

HP MediaSmart Server Software Upgrade from v.2 to v.3

White Paper: Whole Disk Encryption

How To Install A Cisco Vpn Client V4.9.9 On A Mac Or Ipad (For A University)

BitLocker To Go User Guide

The Shortcut Guide To

Client Server Registration Protocol

EMC DATA DOMAIN ENCRYPTION A Detailed Review

Apple Mac VPN Service Setting up Remote Desktop

Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015

Mac OS X 10.6 Snow Leopard Installation and Setup Guide

Shutting down / Rebooting Small Business Server 2003 Version 1.00

Data Storage on Mobile Devices Introduction to Computer Security Final Project

Check out our website!

PARALLELS SERVER BARE METAL 5.0 README

ScoMIS Encryption Service

RDM+ Desktop for Windows Getting Started Guide

Transcription:

10 Ways to Not Get Caught Hacking On Your Mac

Three18 is a Comprehensive Technology Solutions Provider Apple Certified Partner Microsoft Gold Partner Symantec Security Solutions Partner Novell and RedHat Certified Partner EMC Dantz Retrospect Partner Three18 is a Trusted Information Technology Partner to hundreds of Companies in Southern California

The talk... First, I m not condoning doing anything that requires you to need to hide anything! The more collaborative the better. But, let s get through the talk first due to time constraints.

#1 - Time Stamps Time stamps help establish a timeline of forensic tracking. This extends from time modified to time created as well. While changing the time stamps of every file on your operating system isn t a cure-all, it does make establishing a timeline more difficult. You can run a shell script that will touch every single file on your operating system nightly This will effectively make tracing the last modified dates impossible (but don t forget about those creation dates)

#2 - No History, No Trace The history keeps a listing of all the shell commands run on the system Many GUI tools actually run shell commands and log their run commands into the shell history Clear the history files on the system This helps to make sure that the most recently run commands will not be able to be found

#3 - Keep the Trash Empty and Do So Securely Just throwing a file away doesn t get rid of it Emptying the Trash does little better Secure Empty Trash really, really gets rid of files You can cron Secure Empty Trash by using the srm command, which is the open source utility that the feature is built on top of When you use the srm command, use the -f flag to force emptying Use the -m to overwrite the data with 7 passes of random data and zeroes

#4 - Don t Keep Firewall Logs If you re the type of person that clears out the firewall logs of remote systems then you should likely be clearing out your own firewall logs as well ipfwloggerd will log firewall activity on your system This can be disabled and it won t log data any more Still delete those logs at /private/var/log/ipfw.log Oh, and the archives at /private/var/ipfw.log.*.gz

#5 - Use FileVault FileVault encrypts your home folder into a dmg file that is encrypted with AES encryption If someone wants to get into your filevault they will be able to but this will slow things down If you use a very complex password then it will be more difficult to decrypt that filevault password The Master Password can unlock any filevault disk images, so make sure that this password is uncrackable

#6 - Use Encrypted Disk Images for Everything Like with filevault, encrypted disk images store data in encrypted files These are easy to create and provide an additional level of security, creating an encrypted disk images inside of encrypted disk images If you don t use encrypted disk images you can use secure channels. For example: Metadata in music files in itunes library in the filevault Hidden image data in an iphoto library in the filevault Hidden data in comments field of Word documents in an encrypted disk image the filevault

#7 - Clear those logs Log files help to establish the actions that were taken, the systems that you have connected to and what was done on those systems Remember when running a secure shell that there are two sets of logs to clear Most logs are stored in /private/var/log/ Console can be used to view where the others are stored and you have a nifty clear button to clear specified logs

#8 - Secure Virtual Memory Virtual memory is a place that forensics specialists often look to reconstruct the last moments before a system was restarted By using the secure virtual memory feature you will make it where it is not possible to access the previous virtual memory of a system following its restart

#9 - RAID Concatenated RAIDs are JBODs A JBOD can easily be reconstructed with a missing member, but it provides one more layer of security This is nice for boot volumes where you are required to use a jump drive to boot the system If you use Xsan to stripe two USB jump drives then you will be able to control the stripe methods that is used to write data to your mini-san By storing only half the data on each drive you mitigate the ability that the data will be reconsructed

#10 - Just Don t Keep Stuff You can t get in trouble if you don t have data Physically destroy the system disks and RAM Don t keep data on your system doesn t mean you don t have to keep data at all Secure channels on untraceable remote systems is always another way to store data If you don t compromise a system too far then people will often never notice data on the system Most people (especially in small businesses) will just delete a file rather than try and trace it

10 Ways to Not Get Caught Hacking On Your Mac