Logo
latest

Authentication

  • Introduction
  • Disable automatic login
  • Require a password when resuming
  • Make that more secure passwords
  • Use a password manager
    • Managers
    • It does not protect from keyloggers
  • Use multi-factor authentication (MFA)
  • Protect SSH access with MFA

Services and applications

  • Introduction
  • Restrict which apps can run
  • System integration protection (SIP)
  • Secure browsers that protect your privacy
  • Use a secure messaging service
  • Use secure email services
    • Articles
  • Use SSH tunnels
    • Tunnelling with local port forwarding
    • Reverse tunnelling with remote port forwarding
    • Dynamic port forwarding
  • Use a VPN service
    • No logs policy
    • Logs timestamps and bandwidth
  • Use a firewall as a VPN fail-safe mechanism
    • Kill switch using pf
  • Use alternative DNS servers
    • Alternative DNS servers
    • Use wireshark to check for leaks
  • Use a Tor proxy
    • Tor proxy
    • Set network proxy settings via System Preferences
    • Notes
  • Change MAC address
  • Renew IP lease
  • Edit hosts file

Data

  • Introduction
  • Set up the time machine and backups
    • Partitioning the drive
    • Set up time machine
    • Backups for the file storage partition
  • Enable full disk encryption using FileVault
    • Enable FileVault
    • Create a Vault
  • Password protect files and folders
    • iWork suite documents
    • PDF Files in Preview
    • Microsoft Word files
    • Microsoft PowerPoint and Excel files
    • Password protect folders

Privacy

  • Introduction
  • Disable location services and other privacy settings
  • Remove metadata from files
    • Techniques for metadata removal
  • Edit exif metadata in images
    • Native
      • ExifEdit
  • Remove metadata with hex editors
    • Usage in general
    • Using software
    • Online
  • Clean machine with BleachBit

Malware

  • Introduction
  • Mac myths
    • There are no viruses for Mac
    • Apple quickly fixes vulnerabilities
  • Scan and clean machine
    • Automagically
    • Manually
      • Check activity monitor
      • Check for unwanted applications
      • Look at login items
    • Fail
    • Related
  • Catch and remove daemons and launch agents
    • Automagically assisted
    • Manually
      • Folder actions
      • Remove items
    • Related
  • Analysing trojans
    • Related

Operations security

  • Introduction
    • Fail
  • Use email securely
  • Detecting fake emails and phishing
    • Fake emails
    • Phishing
    • Related
  • Browse more safely
  • Check integrity of downloads
    • Verifying downloaded software
  • ‘;–have i been pwned?

Guards! Guards!

  • Introduction
    • Choosing a firewall for a Mac
    • Choosing a HIDS for a Mac
  • Alphabet soup
    • Firewall
    • IDS
    • IPS
  • macOS intrusion detection systems
    • Host intrusion detection systems
    • Network intrusion detection systems
  • OSSEC
Hardening macOS
  • Hardening macOS
  • Blue Team
  • Improbability Blog
  • About the UU
  • Register

Introduction

  • Restrict which apps can run

  • System integration protection (SIP)

  • Use a VPN service

  • Secure browsers that protect your privacy

  • Use a secure messaging service

  • Use a secure email service

  • Use SSH tunnels

  • Use a VPN service

  • Use a firewall as a VPN fail-safe mechanism

  • Use alternative DNS servers

  • Use a Tor proxy

  • Change MAC address

  • Renew IP lease

  • Edit hosts file

Previous Next

Unseen University, 2023, with a forest garden fostered by /ut7.
Read the Docs v: latest
Versions
latest
Downloads
On Read the Docs
Project Home
Builds