|
|
One more note:
If we want to be paranoid about things, why not also go through your apache logs? I guarantee you will see dozens, if not hundreds, of attempts to "exploit" various vulnerabilities (usually in IIS). Should we go out of our way to "block" those hosts? If you have that kind of time on your hands, knock yourself out. But if you're running a secure configuration - as a fully patched Mac OS X installation in its default configuration is - and have strong passwords (and, for home users, operate behind a hardware NAT/firewall appliance such as a Linksys router or AirPort Base Station), there is no need to jump through all sorts hoops to "protect" yourself from these myriad scripts. |
SearchFrom our Sponsor...Latest Mountain Lion HintsWhat's New:HintsNo new hintsComments last 2 daysNo new commentsLinks last 2 weeksNo recent new linksWhat's New in the Forums?
Hints by TopicNews from Macworld
From Our Sponsors |
|
Copyright © 2014 IDG Consumer & SMB (Privacy Policy) Contact Us All trademarks and copyrights on this page are owned by their respective owners. |
Visit other IDG sites: |
|
|
|
Created this page in 0.09 seconds |
|