In previous articles, we have discussed making changes to the /etc/authorization file using text editors. Apple has a tool in Mac OS X that is specifically designed for that purpose.Continue reading →
The United States National Security Agency has published a pamphlet titled Hardening Tips for the Default Installation of Mac OS X 10.5 “Leopard”.
In this series of articles, I’ll examine each of the tips in the NSA document, how to automate their implementation, and discuss any caveats for each.Continue reading →
This is a topic I’ve seen covered in many places, however most of the articles I see on this topic only get part of the solution or solve it in a way that creates unnecessary security issues. In light of this, I’ve decided to talk about what I consider to be the best practices on […]Continue reading →