Chapter 2. Installation
“A bad beginning makes a bad ending.” | ||
--Euripides, Aegeus |
There are many steps on the path to creating a secure host. Some steps, like those discussed in the previous chapter, happen prior to our having to touch the software. Years of development and maturation have brought the securability of UNIX to Mac OS X. Thousands of man-hours of design and implementation have created Apple’s Security Framework and the applications that use it. But all this work simply provides a way for we users and administrators to create a measure of security for our Macs. The remaining steps in creating a secure host are left to us, who use these systems on a daily basis, using the tools given to us by those who walked the first, few paces ...
Get Mac® OS X Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.